Skip to main content

A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5682))

Abstract

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.

This work is supported in part by grants PolyU 5236/06E, PolyU 5232/07E, PolyU 5243/08E, ZJU-SKL ICT0903, and NSFC No. 60873223 and No. 90818010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Savvides, A., Han, C., Srivastava, M.: Dynamic Fine-Grained Localization in Ad-hoc Networks of Sensors. In: Proc. of ACM MOBICOM (2001)

    Google Scholar 

  2. Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: Proc. of IEEE ICBN (2005)

    Google Scholar 

  3. Bahl, P., Padmanabhan, V.N.: RADAR:An In-building RF-based User Location and Tracking System. In: Proc. of IEEE INFOCOM (2000)

    Google Scholar 

  4. Capkun, S., Hubaux, J.P.: Secure Positioning of Wireless Devices with Application to Sensor Networks. In: Proc. of IEEE INFOCOM (2005)

    Google Scholar 

  5. Khabbazian, M., Mercier, H., Bhargava, V.K.: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure. In: Proc. of IEEE GLOBECOM (2006)

    Google Scholar 

  6. Lazos, L., Poovendran, R.: SeRLoc: Robust Localization for Wireless Sensor Networks. ACM Trans. on Sensor Networks, 73–100 (2005)

    Google Scholar 

  7. Lazos, L., Poovendran, R.: HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 233–246 (2006)

    Article  Google Scholar 

  8. Liu, D., Ning, P., Du, W.: Attack-Resistant Location Estimation in Sensor Networks. In: Proc. of IEEE IPSN (2005)

    Google Scholar 

  9. Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: Proc. of IEEE IPSN (2005)

    Google Scholar 

  10. Chen, H., Lou, W., Ma, J., Wang, Z.: TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks. In: Proc. of the 2nd Int’l Conf. on Sensor Technologies and Applications (2008)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proc. of IEEE INFOCOM (2003)

    Google Scholar 

  12. Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proc. of ACM WiSe (2004)

    Google Scholar 

  13. Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6, 3–17 (2007)

    Article  Google Scholar 

  14. Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proc. of IEEE INFOCOM (2007)

    Google Scholar 

  15. Chen, H., Lou, W., Wang, Z.: Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. In: Proc. of the 6th International Conference on Ubiquitous Intelligence and Computing (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, H., Lou, W., Wang, Z. (2009). A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03417-6_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03416-9

  • Online ISBN: 978-3-642-03417-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics