Advertisement

The Journal of Supercomputing

, Volume 64, Issue 3, pp 685–701 | Cite as

Secure localization and location verification in wireless sensor networks: a survey

  • Yingpei ZengEmail author
  • Jiannong Cao
  • Jue Hong
  • Shigeng Zhang
  • Li Xie
Article

Abstract

The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors’ locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.

Keywords

Secure localization Location verification Wireless sensor networks Computer network security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422 CrossRefGoogle Scholar
  2. 2.
    Anderson R, Kuhn M (1996) Tamper resistance—a cautionary note. In: Proceedings of the second usenix workshop on electronic commerce Google Scholar
  3. 3.
    Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: Proceedings of MASS Google Scholar
  4. 4.
    Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of third international conference on security in pervasive computing (SPC ’06) Google Scholar
  5. 5.
    Boukerche A, Oliveira H, Nakamura E, Loureiro A (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96–101 CrossRefGoogle Scholar
  6. 6.
    Brands S, Chaum D (1993) Distance-bounding protocols. In: Proceedings of EUROCRYPT Google Scholar
  7. 7.
    Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings of INFOCOM Google Scholar
  8. 8.
    Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun. doi: 10.1109/JSAC.2005.861380
  9. 9.
    Capkun S, Cagalj M, Srivastava M (2006) Securing localization with hidden and mobile base stations. In: Proceedings of INFOCOM Google Scholar
  10. 10.
    Capkun S, Rasmussen K, Cagalj M, Srivastava M (2008) Secure location verification with hidden and mobile base stations. IEEE Trans Mobile Comput 7(4):470–483 CrossRefGoogle Scholar
  11. 11.
    Chandran N, Goyal V, Moriarty R, Ostrovsky R (2009) Position based cryptography. In: Proceedings of CRYPTO Google Scholar
  12. 12.
    Du W, Fang L, Ning P (2005) LAD: Localization anomaly detection forwireless sensor networks. In: Proceedings of IPDPS Google Scholar
  13. 13.
    Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: Proceedings of ICC Google Scholar
  14. 14.
    Ekici E, Vural S, McNair J, Al-Abri D (2008) Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw 6(2):195–209 CrossRefGoogle Scholar
  15. 15.
    Ferreres AT, Alvarez B, Garnacho A (2008) Guaranteeing the authenticity of location information. IEEE Personal Commun Mag 7(3):72–80 Google Scholar
  16. 16.
    Fletcher R (2000) Practical methods of optimization, 2nd edn. Wiley, New York Google Scholar
  17. 17.
    Goldenberg DK, Bihler P, Cao M, Fang J, Anderson BDO, Morse AS, Yang YR (2006) Localization in sparse networks using sweeps. In: Proceedings of MobiCom Google Scholar
  18. 18.
    He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of MobiCom Google Scholar
  19. 19.
    He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058 CrossRefGoogle Scholar
  20. 20.
    Hu Y, Perrig A, Johnson D (2003) Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM Google Scholar
  21. 21.
    Hwang J, He T, Kim Y (2007) Detecting phantom nodes in wireless sensor networks. In: Proceedings of INFOCOM Google Scholar
  22. 22.
    Jian L, Yang Z, Liu Y (2010) Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization. In: Proceedings of INFOCOM Google Scholar
  23. 23.
    Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of MobiCom Google Scholar
  24. 24.
    Kindberg T, Zhang K, Shankar N (2002) Context authentication using constrained channels. In: Proceedings of WMCSA Google Scholar
  25. 25.
    Kiyavash N, Koushanfar F (2007) Anti-collusion position estimation in wireless sensor networks. In: Proceedings of MASS Google Scholar
  26. 26.
    Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Netw 43(4):499–518 zbMATHCrossRefGoogle Scholar
  27. 27.
    Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of ACM WiSe Google Scholar
  28. 28.
    Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233–246 CrossRefGoogle Scholar
  29. 29.
    Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: Proceedings of IPSN Google Scholar
  30. 30.
    Leinmuller T, Schoch E, Kargl F (2006) Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun 13(5):16–21 CrossRefGoogle Scholar
  31. 31.
    Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of IPSN Google Scholar
  32. 32.
    Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM SASN Google Scholar
  33. 33.
    Liu D, Ning P, Du W (2005) Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proceedings of ICDCS Google Scholar
  34. 34.
    Liu D, Ning P, Du WK (2005) Attack-resistant location estimation in sensor networks. In: Proceedings of IPSN Google Scholar
  35. 35.
    Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39 zbMATHCrossRefGoogle Scholar
  36. 36.
    Liu J, Zhang Y, Zhao F (2006) Robust distributed node localization with error management. In: Proceedings of MobiHoc Google Scholar
  37. 37.
    Mao G, Fidan B, Anderson BDO (2007) Wireless sensor network localization techniques. Comput Netw 51(10):2529–2553 zbMATHCrossRefGoogle Scholar
  38. 38.
    Misra S, Bhardwaj S, Xue G (2006) ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment. In: Proceedings of MILCOM Google Scholar
  39. 39.
    Misra S, Xue G, Bhardwaj S (2009) Secure and robust localization in a wireless ad hoc environment. IEEE Trans Veh Technol 58(3):1480–1489 CrossRefGoogle Scholar
  40. 40.
    Moore D, Leonard J, Rus D, Teller S (2004) Robust distributed network localization with noisy range measurements. In: Proceedings of SenSys Google Scholar
  41. 41.
    Niculescu D, Nath B (2001) Ad hoc positioning system (APS). In: Proceedings of IEEE GLOBECOM Google Scholar
  42. 42.
    Niculescu D, Nath B (2003) Ad hoc positioning system (aps) using aoa. In: Proceedings of INFOCOM Google Scholar
  43. 43.
    Rousseeuw P, Leroy A (2003) Robust regression and outlier detection. Wiley-Interscience, New York Google Scholar
  44. 44.
    Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: Proceedings of WiSe Google Scholar
  45. 45.
    Savarese C, Rabay J (2002) Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In: Proceedings of USENIX Google Scholar
  46. 46.
    Savvides A, Han CC, Srivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of MobiCom Google Scholar
  47. 47.
    Savvides A, Park H, Srivastava MB (2002) The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of WSNA Google Scholar
  48. 48.
    Shang Y, Ruml W, Zhang Y (2003) Localization from mere connectivity. In: Proceedings of MobiHoc Google Scholar
  49. 49.
    Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: Proceedings of DASC Google Scholar
  50. 50.
    Srinivasan A, Wu J (2008) A survey on secure localization in wireless sensor networks. In: Furht B (ed) Encyclopedia of wireless and mobile communications. CRC Press, Boca Raton Google Scholar
  51. 51.
    Srinivasan A, Wu J, Teitelbaum J (2007) Distributed reputation-based secure localization in sensor networks. J Auton Trusted Comput. http://www.cis.temple.edu/~wu/DRBTS_JournalVersion_JoATC.pdf
  52. 52.
    Vora A, Nesterenko M (2006) Secure location verification using radio broadcast. IEEE Trans Depend Secure Comput 3(4):377–385 CrossRefGoogle Scholar
  53. 53.
    Wang C, Xiao L (2006) Locating sensors in concave areas. In: Proceedings of INFOCOM Google Scholar
  54. 54.
    Wang C, Xiao L (2007) Sensor localization under limited measurement capabilities. IEEE Netw 21(3):16–23 CrossRefGoogle Scholar
  55. 55.
    Wei Y, Yu Z, Guan Y (2007) Location verification algorithms for wireless sensor networks. In: Proceedings of ICDCS Google Scholar
  56. 56.
    Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc Google Scholar
  57. 57.
    Zeng Y, Zhang S, Guo S, Li X (2007) Secure hop-count based localization in wireless sensor networks. In: Proceedings of CIS Google Scholar
  58. 58.
    Zeng Y, Cao J, Hong J, Xie L (2009) Secure localization and location verification in wireless sensor networks. In: Proceedings of TSP Google Scholar
  59. 59.
    Zeng Y, Cao J, Hong J, Zhang S, Xie L (2009) SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks. In: Proceedings of WSNS Google Scholar
  60. 60.
    Zeng Y, Cao J, Zhang S, Guo S, Xie L (2009) Pollution attack: a new attack against localization in wireless sensor networks. In: Proceedings of WCNC Google Scholar
  61. 61.
    Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835 CrossRefGoogle Scholar
  62. 62.
    Zhong S, Jadliwala M, Upadhyaya S, Qiao C (2008) Towards a theory of robust localization against malicious beacon nodes. In: Proceedings of INFOCOM Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Yingpei Zeng
    • 1
    Email author
  • Jiannong Cao
    • 3
  • Jue Hong
    • 1
  • Shigeng Zhang
    • 2
  • Li Xie
    • 1
  1. 1.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingP.R. China
  2. 2.Department of Computer ScienceCentral South UniversityChangshaP.R. China
  3. 3.Department of ComputingHong Kong Polytechnic UniversityHong KongP.R. China

Personalised recommendations