Skip to main content

Secure Localization Algorithms in Wireless Sensor Networks: A Review

  • Conference paper
  • First Online:
Advances in Computer Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 760))

Abstract

Localization plays a vital role in understanding the application context for wireless sensor networks (WSNs). However, it is vulnerable to various threats due to the open arrangement area, the nature of radio broadcasting, and resource constraint. Two kinds of attacks on localization process need to be investigated. On the one hand, adversaries may capture, impersonate, replicate, or fabricate nodes to mislead the target to an incorrect position. On the other hand, adversaries may tamper, interfere, replay, or modify jointly localization information to disturb the localization. This paper describes two kinds of localization attacks and gives a systematic survey of existing secure localization solutions, including the design ideas, application scopes, and limitations. Next, several novel secure localization schemes for special WSNs applications, including Underwater Wireless Sensor Networks (UWSNs), Wireless Body Area Network (WBAN) and three-dimensional (3D), are analyzed. Finally, many open problems for secure localization are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: 6th annual international conference on Mobile computing and networking, pp. 243–254. Massachusetts, Boston (2000)

    Google Scholar 

  2. Liu, D., Ning, P.: Location-based Pairwise key establishments for static sensor networks. In: 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72–82. ACM (2003)

    Google Scholar 

  3. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: 2nd ACM workshop on Wireless security, pp. 1–10. ACM (2003)

    Google Scholar 

  4. Jiang, J., Han, G., Zhu, C., et al.: Secure localization in wireless sensor networks: a survey. J. Commun. 6(6), 460–470 (2011)

    Article  Google Scholar 

  5. Srinivasan, A., Wu, J.: A survey on secure localization in wireless sensor networks. In: Encyclopedia of Wireless and Mobile Communications. Taylor and Francis Group (2007)

    Google Scholar 

  6. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  7. Zeng, Y., Cao, J., Hong, J., et al.: Secure localization and location verification in wireless sensor networks: a survey. J. Supercomput. 64(3), 685–701 (2013)

    Article  Google Scholar 

  8. Chen, X.: Defense against node compromise in sensor network security. FIU Electronic Theses and Dissertations (2007)

    Google Scholar 

  9. Newsome, J., Shi, E., Song, D., et al.: The Sybil attack in sensor networks: analysis and defenses. In: 3rd international symposium on Information processing in sensor networks, pp. 259–268. ACM (2004)

    Google Scholar 

  10. Yu, C.M., Lu, C.S., Kuo, S.Y.: Efficient and distributed detection of node replication attacks in mobile sensor networks. In: VTC 2009, pp. 1–5. IEEE (2009)

    Google Scholar 

  11. Jain, M., Kandwal, H.: A survey on complex wormhole attack in wireless ad hoc networks. In: 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 555–558. IEEE (2009)

    Google Scholar 

  12. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)

    Article  Google Scholar 

  13. Cao, X., Yu, B., Chen, G., et al.: Security analysis on node localization systems of wireless sensor networks. China J. Softw. 19(4), 879–887 (2008)

    Article  Google Scholar 

  14. Xing, K., Liu, F., Cheng, X., et al.: Real-time detection of clone attacks in wireless sensor networks. In: ICDCS 2008, pp. 3–10. IEEE (2008)

    Google Scholar 

  15. Yang, W., Zhu, W.T.: Voting-on-grid clustering for secure localization in wireless sensor networks. In: ICC 2010, pp. 1–5. IEEE (2010)

    Google Scholar 

  16. Wu, J.F., Chen, H.L., Lou, W., Wang, Z., Wang, Z.: Label-based DV-hop localization against wormhole attacks in wireless sensor networks. In: 5th International Conference on Networking, Architecture and Storage, pp. 79–88. Macau, China (2010)

    Google Scholar 

  17. Garg, R., Varna, A.L., Wu, M.: Gradient descent approach for secure localization in resource constrained wireless sensor networks. In: ICASSP 2010, pp. 1854–1857. IEEE (2010)

    Google Scholar 

  18. Jadliwala, M., Zhong, S., Upadhyaya, S., Qiao, C., Hubaux, J.: Secure distance-based localization in the presence of cheating beacon nodes. IEEE Trans. Mob. Comput. 9(6), 810–823 (2010)

    Article  Google Scholar 

  19. Wang, D., Yang, L.: Cooperative robust localization against malicious anchors based on semi-definite programming. In: MILCOM 2012, pp. 1–6. IEEE (2012)

    Google Scholar 

  20. Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, pp. 1917–1928. IEEE (2005)

    Google Scholar 

  21. Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)

    Article  Google Scholar 

  22. Brands S., Chaum D.: Distance-bounding protocols. In: EUROCRYPT ’93, pp. 344–359. Springer (1993)

    Google Scholar 

  23. Lazos, L., Poovendran, R.: SeRLoc: secure range-independent localization for wireless sensor networks. In: WiSe 2004, pp. 21–30. Philadelphia (2004)

    Google Scholar 

  24. Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 233–246 (2006)

    Article  Google Scholar 

  25. He, D., Cui, L., Huang, H., Ma, M.: Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans. Parallel Distrib. 20(7), 1050–1058 (2009)

    Article  Google Scholar 

  26. Zhang, Y., Liu, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun. 24(4), 829–835 (2006)

    Article  Google Scholar 

  27. Garg, R., Varna, A.L., Wu, M.: A gradient descent based approach to secure localization in mobile sensor networks. In: ICASSP 2012, pp. 1869–1872. IEEE (2012)

    Google Scholar 

  28. Wei, Y., Guan, Y.: Lightweight Location verification algorithms for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(5), 938–950 (2013)

    Article  Google Scholar 

  29. Du, W., Fang, L., Ning, P.: LAD: location anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7), 874–886 (2006)

    Article  Google Scholar 

  30. Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: INFOCOM 2006, pp. 23–29. Barcelona (2006)

    Google Scholar 

  31. Čapkun, S., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)

    Article  Google Scholar 

  32. Ekici, E., Mcnair, J., Al-Abri, D.: A probabilistic approach to location verification in wireless sensor networks. In: ICC 2006, pp. 3485–3490. IEEE (2006)

    Google Scholar 

  33. Ekici, E., Vural, S., McNair, J., Al-Abri, D.: Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw. 6(2), 195–209 (2008)

    Article  Google Scholar 

  34. Mandal, P.S., Ghosh, A.K.: Secure position verification for wireless sensor networks in noisy channels. In: Ad-hoc, Mobile, and Wireless Networks, pp. 150–163. Springer, Berlin, Heidelberg (2011)

    Google Scholar 

  35. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: ACM WiSe 2003, pp. 1–10. ACM (2003)

    Google Scholar 

  36. Li, C., Chen, F., Zhan, Y., et al.: Security verification of location estimate in wireless sensor networks. In: WiCOM 2010, pp. 1–4. IEEE (2010)

    Google Scholar 

  37. Arisar, S.H., Kemp, A.H.: A comprehensive investigation of secure location estimation techniques for WSN applications. Secur. Commun. Netw. 4(4), 447–459 (2011)

    Article  Google Scholar 

  38. Han, G., Liu, L., Jiang, J., et al.: A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16(2), 229 (2016)

    Article  Google Scholar 

  39. Lo, G.Q., González-Valenzuela, S., Leung, V.: Wireless body area network node localization using small-scale spatial information. IEEE J. Biomed. Health Inform. 17(3), 715–726 (2013)

    Article  Google Scholar 

  40. Chen, Y., Jiang, C.H., Guo, C.: A 3D secure localization algorithm resistant to non-coordinated attack in wireless sensor network. Chin. J. Sensors Actuators 28(11), 1702–1707 (2015)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National High Technology Research and Development Program of China (Grant No. 2015AA016005), the National Natural Science Foundation of China (Grant Nos. 61402096 and 61173153), Shenzhen Key Laboratory of Ultrahigh Refractive Structural Material (Grant No. CXB201105100093A), and Shenzhen Key Laboratory of Data Science and Modeling (Grant No. CXB201109210103A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dazhe Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H., Wen, Y., Lu, Y., Zhao, D., Ji, C. (2019). Secure Localization Algorithms in Wireless Sensor Networks: A Review. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 760. Springer, Singapore. https://doi.org/10.1007/978-981-13-0344-9_47

Download citation

Publish with us

Policies and ethics