|
|
Efficient distributed location verification in
wireless sensor networks |
Qiyuan ZHANG,Xuehai ZHOU, |
College of Computer
Science, University of Science and Technology of China, Hefei 230027,
China;Suzhou Institute for
Advanced Study, University of Science and Technology of China, Suzhou
215123, China; |
|
|
Abstract In wireless sensor networks, reliable location information is not only necessary to event reports but also crucial to network functionalities such as geographic routing, distributed information storage/retrieval. However, sensors could be compromised by adversaries to claim arbitrary locations to disrupt the normal network operation. Thus, location verification should be carried out for security considerations. Due to the importance of the problem, we propose a highly efficient algorithm that effectively detects false location claims from compromised sensors. Extensive analysis and simulation results demonstrate that our algorithm is energy-efficient and resilient against adversaries.
|
Keywords
sensor networks
security
location verification
|
Issue Date: 05 March 2010
|
|
|
Akyildiz I, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: asurvey. Computer Networks, 2002, 38: 393–422
doi: 10.1016/S1389-1286(01)00302-4
|
|
Karp B, Kung H. Gpsr: Greedy perimeter statelessrouting for wireless networks. In: Proceedingsof the 6th Annual ACM/IEEE International Conference on Mobile Computingand Networking (MobiCom), 2000
|
|
Rao A, Ratnasamy S, Papadimitriou C, et al. Geographic routing without location information. In: Proceedings of the 9th Annual ACM/IEEE InternationalConference on Mobile Computing and Networking (MobiCom), 2003
|
|
Fang Q, Gao J, Guibas L. Landmark-based information storage and retrieval in sensornetworks. In: Proceedings of the 25th Conferenceof the IEEE Communication Society (INFOCOM), 2006
|
|
Gao J, Guibas L, Hershberger J, et al. Fractionally cascaded information in a sensornetwork. In: Proceedings of the 3rd InternationalSymposium on Information Processing in Sensor Networks (IPSN), 2004
|
|
Douceur J. Thesybil attack. In: Proceedings of the 1stInternational Workshop on Peer-to-Peer Systems, 2002
|
|
Newsome J, Shi E, Song D, et al. The sybil attack in sensor networks: Analysisand defenses. In: Proceedings of the 3rdInternational Symposium on Information Processing in Sensor Networks(IPSN), 2004
|
|
Karlof C, Wagner D. Secure routing in wirelesssensor networks: Attacks and countermeasures. Sensor Network Protocols and Applications, 2003, 1: 293–315
|
|
Przydatek B, Song D, Perrig A. Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conferenceon Embedded Networked Sensor Systems, 2003, 5–7
|
|
Chen H, Perrig A, Song D. Secure hierarchical innetwork aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computerand Communications Security (CCS), 2006
|
|
Wellenhoff B, Lichtenegger H, Collins J. Global Positioning System: Theory and Practice. 4th ed. Springer Verlag, 1997
|
|
He T, Huang C, Blum M, et al. Range-free localization schemes in large scalesensor networks. In: Proceedings of the9th Annual ACM/IEEE International Conference on Mobile Computing andNetworking (MobiCom), 2003
|
|
Niculescu D, Nath B. Ad hoc positioning system(APS) using AOA. In: Proceedings of the22nd Conference of the IEEE Communication Society (INFOCOM), 2003
|
|
Merkle R. Acertified digital signature. In: Proceedingsof the 9th Annual International Cryptology Conference on Advancesin Cryptology, 1989, 218–238
|
|
Du W, Deng J, Han Y, Varshney P. Apairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computerand Communications Security (CCS), 2003
|
|
Eschenauer L, Gligor V. A key-management scheme fordistributed sensor networks. In: Proceedingsof the 9th ACM conference on Computer and Communications Security(CCS), 2002
|
|
Sastry N, Shankar U, Wagner D. Secure verification of location claims. In: Proceeding of the ACM Workshop on Wireless Security (WiSe), 2002
|
|
Abu-Ghazaleh N, Kang K, Liu K. Toward resilient geographic forwarding in wireless sensornetworks. In: Proceedings of the 1st ACMInternational Workshop on Quality of Service and Security in Wirelessand Mobile Networks, 2005
|
|
Capkun S, Hubaux J. Secure positioning of wirelessdevices with applications to sensor networks. In: Proceedings of the 24th Conference of the IEEE Communication Society(INFOCOM), 2005
|
|
Du W, Fang L, Ning P. Lad: Location anomaly detection for wireless sensor networks. In: Proceedings of the 19th International Paralleland Distributed Processing Symposium (IPDPS), 2005
|
|
Ekici E, McNair J, Al-Abri D. A probabilistic approach to location verification forwireless sensor networks. In: Proceedingsof IEEE International Conference on Communications (ICC), 2006
|
|
Wei Y, Yu Z, Guan Y. Location verification algorithms for wireless sensornetworks. In: Proceedings of the 27th IEEEInternational Conference on Distributed Computing Systems (ICDCS), 2007
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|