Abstract
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.
This work is supported in part by grants PolyU 5236/06E, PolyU 5232/07E, PolyU 5243/08E, ZJU-SKL ICT0903, and NSFC No. 60873223 and No. 90818010.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Savvides, A., Han, C., Srivastava, M.: Dynamic Fine-Grained Localization in Ad-hoc Networks of Sensors. In: Proc. of ACM MOBICOM (2001)
Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: Proc. of IEEE ICBN (2005)
Bahl, P., Padmanabhan, V.N.: RADAR:An In-building RF-based User Location and Tracking System. In: Proc. of IEEE INFOCOM (2000)
Capkun, S., Hubaux, J.P.: Secure Positioning of Wireless Devices with Application to Sensor Networks. In: Proc. of IEEE INFOCOM (2005)
Khabbazian, M., Mercier, H., Bhargava, V.K.: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure. In: Proc. of IEEE GLOBECOM (2006)
Lazos, L., Poovendran, R.: SeRLoc: Robust Localization for Wireless Sensor Networks. ACM Trans. on Sensor Networks, 73–100 (2005)
Lazos, L., Poovendran, R.: HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 233–246 (2006)
Liu, D., Ning, P., Du, W.: Attack-Resistant Location Estimation in Sensor Networks. In: Proc. of IEEE IPSN (2005)
Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: Proc. of IEEE IPSN (2005)
Chen, H., Lou, W., Ma, J., Wang, Z.: TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks. In: Proc. of the 2nd Int’l Conf. on Sensor Technologies and Applications (2008)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proc. of IEEE INFOCOM (2003)
Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proc. of ACM WiSe (2004)
Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6, 3–17 (2007)
Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proc. of IEEE INFOCOM (2007)
Chen, H., Lou, W., Wang, Z.: Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. In: Proc. of the 6th International Conference on Ubiquitous Intelligence and Computing (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, H., Lou, W., Wang, Z. (2009). A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)