Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks

  • Nabila Labraoui
  • Mourad Gueroui
  • Makhlouf Aliouat
Part of the Communications in Computer and Information Science book series (CCIS, volume 166)


Sensors’ localizations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors. However, almost all previously proposed techniques can be trivially abused by a malicious adversary involving false position. The wormhole attack is a particularly challenging one since the external adversary which acts in passive mode, does not need to compromise any nodes or have access to any cryptographic keys. In this paper, wormhole attack in DVhop is discussed, and a Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure. Using analysis and simulation, we show that our solution is effective in detecting and defending against wormhole attacks with a high detection rate.


Range-free localization secure localization WSN 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chong, C.Y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. IEEE 91(8), 1247–1256 (2003)CrossRefGoogle Scholar
  2. 2.
    Rabaey, M.J., Ammer, J.L., da Silva, J.R., Patel, D., Roundy, S.: PicoRadio supports ad hoc ultra-low power wireless networking. Computer 33(7), 42–48 (2002)CrossRefGoogle Scholar
  3. 3.
    Pirreti, M., Vijaykrishnan, N., McDaniel, P., Madan, B.: SLAT: Secure Localization with Attack Tolerance. Technical report: NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ (2005)Google Scholar
  4. 4.
    Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: IEEE ICBN (2005)Google Scholar
  5. 5.
    Bahl, P., Padmanabhan, V.N.: RADAR:An In-building RF-based User Location and Tracking System. In: IEEE INFOCOM (2000)Google Scholar
  6. 6.
    Labraoui, N., Gueroui, M., Aliouat, M., Zia, T.: Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. Ad hoc & Sensor Networks. International Journal 12 (2011) (in Press)Google Scholar
  7. 7.
    Zia, T., Zomaya, A.Y.: A security framework for wireless sensor networks. In: IEEE Sensor Applications Symposium, Texas (2006)Google Scholar
  8. 8.
    Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS). In: IEEE GLOBECOM 2001, San Antonio, pp. 2926–2931 (2001)Google Scholar
  9. 9.
    Wenfeng, L.: Wireless sensor networks and mobile robot control, pp. 54–60. Science Press (2009)Google Scholar
  10. 10.
    Parkinson, B., Spilker, J.: Global positioning system: theory and application. American Institute of Aeronautics and Astronautics, Washington, D.C (1996)CrossRefGoogle Scholar
  11. 11.
    Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. In: INFOCOM, vol. 2, pp. 1976–1986 (2003)Google Scholar
  12. 12.
    Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: CNDS 2002 (2002)Google Scholar
  13. 13.
    Goldsmith, A.: Wireless Communications. Cambridge University Press, New York (2005)CrossRefGoogle Scholar
  14. 14.
    Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Englewood Cliffs (2001)MATHGoogle Scholar
  15. 15.
    Shon, T., Choi, H.: Towards the implementation of reliable data transmission for 802.15.4-based wireless sensor networks. In: Sandnes, F.E., Zhang, Y., Rong, C., Yang, L.T., Ma, J. (eds.) UIC 2008. LNCS, vol. 5061, pp. 363–372. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  16. 16.
    Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. In: 4th IEEE Consumer Communications and Networking Conference (2007)Google Scholar
  17. 17.
    Zheng J.: Low rate wireless personal area networks: ns-2 simulator for 802.15.4 (release v1.1) (2007),
  18. 18.
    The Rice Monarch Project: Wireless and mobility extensions to ns-2 (2007),
  19. 19.
    Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: IEEE IPSN, pp. 324–331 (2005)Google Scholar
  20. 20.
    Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: 2nd IEEE Int’l Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283 (2006)Google Scholar
  21. 21.
    Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks. In: IEEE ICDCS, pp. 609–619 (2005)Google Scholar
  22. 22.
    Wang, C., Liu, A., Ning, P.: Cluster-Based Minimun Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks. In: the Int’l Conf. on Wireless Algorithms, Systems and Applications, pp. 29–37 (2007)Google Scholar
  23. 23.
    Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IEEE IPSN, pp. 91–98 (2005)Google Scholar
  24. 24.
    Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 1(1), 73–100 (2005)CrossRefGoogle Scholar
  25. 25.
    Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 233–246 (2006)CrossRefGoogle Scholar
  26. 26.
    Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Zhang, D., Portmann, M., Tan, A.-H., Indulska, J. (eds.) UIC 2009. LNCS, vol. 5585, pp. 296–309. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  27. 27.
    Wu, J., Chen, H., Lou, W., Wang, Z.: Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks. In: 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau SAR, China (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Nabila Labraoui
    • 1
  • Mourad Gueroui
    • 2
  • Makhlouf Aliouat
    • 3
  1. 1.STICUniversity of TlemcenAlgeria
  2. 2.PRISMUniversity of VersaillesFrance
  3. 3.University of SetifAlgeria

Personalised recommendations