COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks

  • Yawen Wei
  • Zhen Yu
  • Yong Guan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4026)


In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a robust multi-hop localization scheme, namely COTA, to mitigate various attacks in wireless sensor networks. In this scheme, each localized sensor generates a COnfidence TAg to quantify the quality of its estimated location and broadcasts both the confidence tag and the estimated location in reference messages. When receiving sufficient number of references, an unlocalized sensor filters out bad references and weighs the remaining ones according to their tags. Once location determination is done, the sensor generates its own confidence tag from the indicator of its localization error. By properly setting the filtering metrics and computing the confidence tags, COTA can prevent the proliferation of location errors and achieves accurate location estimations and high localized percentage for sensor networks. To our knowledge, ours is the first work to address the security-aware multi-hop localization problem. We finally present security analysis and simulations to evaluate the effectiveness of COTA.


Sensor Network Wireless Sensor Network Geographical Indicator Damage Degree Beacon Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bahl, P., Padmanabhan, V.: RADAR: An In-Building RF-based User Location and Tracking System. IEEE INFOCOM (2000)Google Scholar
  2. 2.
    Brown, R., Hwang, P.: Introduction to Signals and Applied Kalman Filtering (1997)Google Scholar
  3. 3.
    Bulusu, N., Heidemann, J., Estrin, D.: GPS-less Low Cost Outdoor Localization for Very Small Devices, IEEE Personal Communications Vol. IEEE Personal Communications 7(5), 28 C34 (2000)CrossRefGoogle Scholar
  4. 4.
    Capkun, S., Hubaux, J.: Secure Positioning in Sensor Networks, Technical report EPFL/IC/200444 (2004)Google Scholar
  5. 5.
    Doherty, L., Pister, K., Ghaoui, L.: Convex position estimation in wireless sensor networks. IEEE INFOCOM (2001)Google Scholar
  6. 6.
    Du, W., Fang, L., Ning, P.: LAD: Localization anomaly detection for wireless sensor networks. IEEE IPDPS (2005)Google Scholar
  7. 7.
    Eren, T., Goldenberg, D., Whiteley, J., Yang, Y., Morse, A., Anderson, B., Belhumeur, P.: Rigidity, Computation, and Randomization in Network Localization. IEEE INFOCOM (2004)Google Scholar
  8. 8.
    Fok, C., Roman, G., Lu, C.: Mobile Agent Middleware for Sensor Networks: An Application Case Study, IPSN (2005)Google Scholar
  9. 9.
    Greene, W.: Econometric Analsis, 3rd edn. Prince Hall (1997)Google Scholar
  10. 10.
    Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. ACM Mobicom, New York (1999)Google Scholar
  11. 11.
    He, T., Huang, C., Blum, C., Stankovic, J., Abdelzaher, T.: Range-Free Localization Schemes in Large Scale Sensor Network. ACM MobiCom, New York (2003)Google Scholar
  12. 12.
    Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of the 11th Network and Distributed System Security Symposium, pp. 131–141 (2003)Google Scholar
  13. 13.
    Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. IEEE INFOCOM (2003)Google Scholar
  14. 14.
    Ji, X., Zha, H.: Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. IEEE INFOCOM (2004)Google Scholar
  15. 15.
    Lazos, L., Poovendran, R.: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. In: ACM Workshop on Wireless Security (WiSe) (2004)Google Scholar
  16. 16.
    Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN (2005)Google Scholar
  17. 17.
    Liu, D., Peng, N., Du, W.: Attack-Resistant Location Estimation in Sensor Networks, IPSN (2005)Google Scholar
  18. 18.
    Moore, D., Leonard, J., Rus, D., Teller, S.: Robust distributed network localization with noisy range measurements. ACM SenSys, New York (2004)Google Scholar
  19. 19.
    Nagpal, R., Shrobe, H., Bachrach, J.: Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network, IPSN (2003)Google Scholar
  20. 20.
    Nicolescu, D., Nath, B.: Ad-Hoc Positioning Systems (APS). IEEE GLOBECOM (2001)Google Scholar
  21. 21.
    Niculescu, D., Nath, B.: Dv based positioning in ad hoc networks. Journal of Telecommunication Systems (2003)Google Scholar
  22. 22.
    Savvides, A., Han, C., Srivastava, M.: Dynamic fine-grained localization in ad-hoc networks of sensors. ACM MobiCom, New York (2001)Google Scholar
  23. 23.
    Savvides, A., Park, H., Srivastava, M.: The Bits and Flops of the N-hop Multilateration Primitive for Node Localization Problems. ACM WSNA, New York (2002)Google Scholar
  24. 24.
    Shang, Y., Ruml, W., Zhang, Y., Fromherz, M.: Localization from mere connectivity. ACM MobiHoc, New York (2003)Google Scholar
  25. 25.
    Shang, Y., Ruml, Y., Zhang, F.M.: Improved MDS-Based Localization. IEEE INFOCOM (2004)Google Scholar
  26. 26.
    So, A., Yu, Y.: Theory of Semidefite Programming for Sensor Network Localization. ACM-SIAM Symposium on Discrete Algorithms (SODA) (2005)Google Scholar
  27. 27.
    Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. ACM Transactions on Information Systems 10(1), 91–102 (1992)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yawen Wei
    • 1
  • Zhen Yu
    • 1
  • Yong Guan
    • 1
  1. 1.Department of Electrical and Computer EngineeringIowa State UniversityAmesUSA

Personalised recommendations