Abstract
Localization plays a vital role in understanding the application context for wireless sensor networks (WSNs). However, it is vulnerable to various threats due to the open arrangement area, the nature of radio broadcasting, and resource constraint. Two kinds of attacks on localization process need to be investigated. On the one hand, adversaries may capture, impersonate, replicate, or fabricate nodes to mislead the target to an incorrect position. On the other hand, adversaries may tamper, interfere, replay, or modify jointly localization information to disturb the localization. This paper describes two kinds of localization attacks and gives a systematic survey of existing secure localization solutions, including the design ideas, application scopes, and limitations. Next, several novel secure localization schemes for special WSNs applications, including Underwater Wireless Sensor Networks (UWSNs), Wireless Body Area Network (WBAN) and three-dimensional (3D), are analyzed. Finally, many open problems for secure localization are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: 6th annual international conference on Mobile computing and networking, pp. 243–254. Massachusetts, Boston (2000)
Liu, D., Ning, P.: Location-based Pairwise key establishments for static sensor networks. In: 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72–82. ACM (2003)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: 2nd ACM workshop on Wireless security, pp. 1–10. ACM (2003)
Jiang, J., Han, G., Zhu, C., et al.: Secure localization in wireless sensor networks: a survey. J. Commun. 6(6), 460–470 (2011)
Srinivasan, A., Wu, J.: A survey on secure localization in wireless sensor networks. In: Encyclopedia of Wireless and Mobile Communications. Taylor and Francis Group (2007)
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Zeng, Y., Cao, J., Hong, J., et al.: Secure localization and location verification in wireless sensor networks: a survey. J. Supercomput. 64(3), 685–701 (2013)
Chen, X.: Defense against node compromise in sensor network security. FIU Electronic Theses and Dissertations (2007)
Newsome, J., Shi, E., Song, D., et al.: The Sybil attack in sensor networks: analysis and defenses. In: 3rd international symposium on Information processing in sensor networks, pp. 259–268. ACM (2004)
Yu, C.M., Lu, C.S., Kuo, S.Y.: Efficient and distributed detection of node replication attacks in mobile sensor networks. In: VTC 2009, pp. 1–5. IEEE (2009)
Jain, M., Kandwal, H.: A survey on complex wormhole attack in wireless ad hoc networks. In: 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 555–558. IEEE (2009)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)
Cao, X., Yu, B., Chen, G., et al.: Security analysis on node localization systems of wireless sensor networks. China J. Softw. 19(4), 879–887 (2008)
Xing, K., Liu, F., Cheng, X., et al.: Real-time detection of clone attacks in wireless sensor networks. In: ICDCS 2008, pp. 3–10. IEEE (2008)
Yang, W., Zhu, W.T.: Voting-on-grid clustering for secure localization in wireless sensor networks. In: ICC 2010, pp. 1–5. IEEE (2010)
Wu, J.F., Chen, H.L., Lou, W., Wang, Z., Wang, Z.: Label-based DV-hop localization against wormhole attacks in wireless sensor networks. In: 5th International Conference on Networking, Architecture and Storage, pp. 79–88. Macau, China (2010)
Garg, R., Varna, A.L., Wu, M.: Gradient descent approach for secure localization in resource constrained wireless sensor networks. In: ICASSP 2010, pp. 1854–1857. IEEE (2010)
Jadliwala, M., Zhong, S., Upadhyaya, S., Qiao, C., Hubaux, J.: Secure distance-based localization in the presence of cheating beacon nodes. IEEE Trans. Mob. Comput. 9(6), 810–823 (2010)
Wang, D., Yang, L.: Cooperative robust localization against malicious anchors based on semi-definite programming. In: MILCOM 2012, pp. 1–6. IEEE (2012)
Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, pp. 1917–1928. IEEE (2005)
Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)
Brands S., Chaum D.: Distance-bounding protocols. In: EUROCRYPT ’93, pp. 344–359. Springer (1993)
Lazos, L., Poovendran, R.: SeRLoc: secure range-independent localization for wireless sensor networks. In: WiSe 2004, pp. 21–30. Philadelphia (2004)
Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 233–246 (2006)
He, D., Cui, L., Huang, H., Ma, M.: Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans. Parallel Distrib. 20(7), 1050–1058 (2009)
Zhang, Y., Liu, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun. 24(4), 829–835 (2006)
Garg, R., Varna, A.L., Wu, M.: A gradient descent based approach to secure localization in mobile sensor networks. In: ICASSP 2012, pp. 1869–1872. IEEE (2012)
Wei, Y., Guan, Y.: Lightweight Location verification algorithms for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(5), 938–950 (2013)
Du, W., Fang, L., Ning, P.: LAD: location anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7), 874–886 (2006)
Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: INFOCOM 2006, pp. 23–29. Barcelona (2006)
Čapkun, S., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)
Ekici, E., Mcnair, J., Al-Abri, D.: A probabilistic approach to location verification in wireless sensor networks. In: ICC 2006, pp. 3485–3490. IEEE (2006)
Ekici, E., Vural, S., McNair, J., Al-Abri, D.: Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw. 6(2), 195–209 (2008)
Mandal, P.S., Ghosh, A.K.: Secure position verification for wireless sensor networks in noisy channels. In: Ad-hoc, Mobile, and Wireless Networks, pp. 150–163. Springer, Berlin, Heidelberg (2011)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: ACM WiSe 2003, pp. 1–10. ACM (2003)
Li, C., Chen, F., Zhan, Y., et al.: Security verification of location estimate in wireless sensor networks. In: WiCOM 2010, pp. 1–4. IEEE (2010)
Arisar, S.H., Kemp, A.H.: A comprehensive investigation of secure location estimation techniques for WSN applications. Secur. Commun. Netw. 4(4), 447–459 (2011)
Han, G., Liu, L., Jiang, J., et al.: A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16(2), 229 (2016)
Lo, G.Q., González-Valenzuela, S., Leung, V.: Wireless body area network node localization using small-scale spatial information. IEEE J. Biomed. Health Inform. 17(3), 715–726 (2013)
Chen, Y., Jiang, C.H., Guo, C.: A 3D secure localization algorithm resistant to non-coordinated attack in wireless sensor network. Chin. J. Sensors Actuators 28(11), 1702–1707 (2015)
Acknowledgements
This work was supported by the National High Technology Research and Development Program of China (Grant No. 2015AA016005), the National Natural Science Foundation of China (Grant Nos. 61402096 and 61173153), Shenzhen Key Laboratory of Ultrahigh Refractive Structural Material (Grant No. CXB201105100093A), and Shenzhen Key Laboratory of Data Science and Modeling (Grant No. CXB201109210103A).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, H., Wen, Y., Lu, Y., Zhao, D., Ji, C. (2019). Secure Localization Algorithms in Wireless Sensor Networks: A Review. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 760. Springer, Singapore. https://doi.org/10.1007/978-981-13-0344-9_47
Download citation
DOI: https://doi.org/10.1007/978-981-13-0344-9_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0343-2
Online ISBN: 978-981-13-0344-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)