ABSTRACT
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, we introduce Secure Walking GPS, a secure localization and key distribution solution for manual deployments of WSNs. Using the location information provided by the GPS and inertial guidance modules on a special master node, Secure Walking GPS achieves accurate node localization and location-based key distribution at the same time. Our analysis and simulation results indicate that the Secure Walking GPS scheme makes a deployed WSN resistant to the Dolev-Yao, the wormhole, and the GPS-denial attacks, has good localization and key distribution performance, and is practical for large-scale WSN deployments.
- S. Camtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 2007. Google ScholarDigital Library
- S. Capkun, M. Cagalj, and M. Srivastava. Securing localization with hidden and mobile base stations. In INFOCOM, 2006.Google Scholar
- D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. Inf. Theory, 29(2), 1983.Google ScholarDigital Library
- L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In CCS, 2002. Google ScholarDigital Library
- T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. Stankovic, and T. Abdelzaher. Achieving real-time target tracking using wireless sensor networks. In RTAS, 2006. Google ScholarDigital Library
- C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys, 2007. Google ScholarDigital Library
- L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. WiSe, 2004. Google ScholarDigital Library
- L. Lazos and R. Poovendran. Hirloc: High-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006. Google ScholarDigital Library
- D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN, 2003. Google ScholarDigital Library
- D. Liu, P. Ning, and W.K. Du. Attack-resistant location estimation in sensor networks. In IPSN, 2005. Google ScholarDigital Library
- Q. Mi, J. Stankovic, and R. Stoleru. Secure walking gps: A secure localization and key distribution scheme for wireless sensor networks. In Technical Report, http://www.cs.virginia.edu/~qm8e/papers/swgps-full.pdfGoogle Scholar
- T. Park and K.G. Shin. Attack-tolerant localization via iterative verification of locations in sensor networks. ACM Trans. on Embedded Computing Systems, 8(1), Dec 2008. Google ScholarDigital Library
- R. Poovendran and L. Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1):27--59, January 2007. Google ScholarDigital Library
- R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux. A practical secure neighbor verification protocol for wireless sensor networks. In WiSec, 2009. Google ScholarDigital Library
- R. Stoleru, T. He, and J. Stankovic. Walking GPS: A practical solution for localization in manually deployed wireless sensor networks. In LCN, 2004. Google ScholarDigital Library
- Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Recommendations
Practical and secure localization and key distribution for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this article, we introduce Secure ...
Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN
Most of the sensor network applications are deployed in a hostile environment. So to keep the confidentiality of the information over sensor network, secure communication between the sink and the sensor nodes is required. Cryptographic key distribution ...
SeRLoc: secure range-independent localization for wireless sensor networks
WiSe '04: Proceedings of the 3rd ACM workshop on Wireless securityIn many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location-aware WSN applications, it is essential to ensure that sensors can determine their location, even in the presence of malicious ...
Comments