Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2010, Vol. 4 Issue (1) : 123-134    https://doi.org/10.1007/s11704-009-0071-x
Research articles
Efficient distributed location verification in wireless sensor networks
Qiyuan ZHANG,Xuehai ZHOU,
College of Computer Science, University of Science and Technology of China, Hefei 230027, China;Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou 215123, China;
 Download: PDF(397 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract In wireless sensor networks, reliable location information is not only necessary to event reports but also crucial to network functionalities such as geographic routing, distributed information storage/retrieval. However, sensors could be compromised by adversaries to claim arbitrary locations to disrupt the normal network operation. Thus, location verification should be carried out for security considerations. Due to the importance of the problem, we propose a highly efficient algorithm that effectively detects false location claims from compromised sensors. Extensive analysis and simulation results demonstrate that our algorithm is energy-efficient and resilient against adversaries.
Keywords sensor networks      security      location verification      
Issue Date: 05 March 2010
 Cite this article:   
Qiyuan ZHANG,Xuehai ZHOU. Efficient distributed location verification in wireless sensor networks[J]. Front. Comput. Sci., 2010, 4(1): 123-134.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-009-0071-x
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I1/123
Akyildiz I, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: asurvey. Computer Networks, 2002, 38: 393–422

doi: 10.1016/S1389-1286(01)00302-4
Karp B, Kung H. Gpsr: Greedy perimeter statelessrouting for wireless networks. In: Proceedingsof the 6th Annual ACM/IEEE International Conference on Mobile Computingand Networking (MobiCom), 2000
Rao A, Ratnasamy S, Papadimitriou C, et al. Geographic routing without location information. In: Proceedings of the 9th Annual ACM/IEEE InternationalConference on Mobile Computing and Networking (MobiCom), 2003
Fang Q, Gao J, Guibas L. Landmark-based information storage and retrieval in sensornetworks. In: Proceedings of the 25th Conferenceof the IEEE Communication Society (INFOCOM), 2006
Gao J, Guibas L, Hershberger J, et al. Fractionally cascaded information in a sensornetwork. In: Proceedings of the 3rd InternationalSymposium on Information Processing in Sensor Networks (IPSN), 2004
Douceur J. Thesybil attack. In: Proceedings of the 1stInternational Workshop on Peer-to-Peer Systems, 2002
Newsome J, Shi E, Song D, et al. The sybil attack in sensor networks: Analysisand defenses. In: Proceedings of the 3rdInternational Symposium on Information Processing in Sensor Networks(IPSN), 2004
Karlof C, Wagner D. Secure routing in wirelesssensor networks: Attacks and countermeasures. Sensor Network Protocols and Applications, 2003, 1: 293–315
Przydatek B, Song D, Perrig A. Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conferenceon Embedded Networked Sensor Systems, 2003, 5–7
Chen H, Perrig A, Song D. Secure hierarchical innetwork aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computerand Communications Security (CCS), 2006
Wellenhoff B, Lichtenegger H, Collins J. Global Positioning System: Theory and Practice. 4th ed. Springer Verlag, 1997
He T, Huang C, Blum M, et al. Range-free localization schemes in large scalesensor networks. In: Proceedings of the9th Annual ACM/IEEE International Conference on Mobile Computing andNetworking (MobiCom), 2003
Niculescu D, Nath B. Ad hoc positioning system(APS) using AOA. In: Proceedings of the22nd Conference of the IEEE Communication Society (INFOCOM), 2003
Merkle R. Acertified digital signature. In: Proceedingsof the 9th Annual International Cryptology Conference on Advancesin Cryptology, 1989, 218–238
Du W, Deng J, Han Y, Varshney P. Apairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computerand Communications Security (CCS), 2003
Eschenauer L, Gligor V. A key-management scheme fordistributed sensor networks. In: Proceedingsof the 9th ACM conference on Computer and Communications Security(CCS), 2002
Sastry N, Shankar U, Wagner D. Secure verification of location claims. In: Proceeding of the ACM Workshop on Wireless Security (WiSe), 2002
Abu-Ghazaleh N, Kang K, Liu K. Toward resilient geographic forwarding in wireless sensornetworks. In: Proceedings of the 1st ACMInternational Workshop on Quality of Service and Security in Wirelessand Mobile Networks, 2005
Capkun S, Hubaux J. Secure positioning of wirelessdevices with applications to sensor networks. In: Proceedings of the 24th Conference of the IEEE Communication Society(INFOCOM), 2005
Du W, Fang L, Ning P. Lad: Location anomaly detection for wireless sensor networks. In: Proceedings of the 19th International Paralleland Distributed Processing Symposium (IPDPS), 2005
Ekici E, McNair J, Al-Abri D. A probabilistic approach to location verification forwireless sensor networks. In: Proceedingsof IEEE International Conference on Communications (ICC), 2006
Wei Y, Yu Z, Guan Y. Location verification algorithms for wireless sensornetworks. In: Proceedings of the 27th IEEEInternational Conference on Distributed Computing Systems (ICDCS), 2007
[1] Bin GUO, Yasan DING, Yueheng SUN, Shuai MA, Ke LI, Zhiwen YU. The mass, fake news, and cognition security[J]. Front. Comput. Sci., 2021, 15(3): 153806-.
[2] Abhishek MAJUMDAR, Arpita BISWAS, Atanu MAJUMDER, Sandeep Kumar SOOD, Krishna Lal BAISHNAB. A novel DNA-inspired encryption strategy for concealing cloud storage[J]. Front. Comput. Sci., 2021, 15(3): 153807-.
[3] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[4] Je Sen TEH, Weijian TENG, Azman SAMSUDIN, Jiageng CHEN. A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators[J]. Front. Comput. Sci., 2020, 14(6): 146405-.
[5] Xiaochen LIU, Chunhe XIA, Tianbo WANG, Li ZHONG, Xiaojian LI. A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service[J]. Front. Comput. Sci., 2020, 14(6): 146808-.
[6] Yanwei ZHOU, Bo YANG. Practical continuous leakage-resilient CCA secure identity-based encryption[J]. Front. Comput. Sci., 2020, 14(4): 144804-.
[7] Yudi ZHANG, Debiao HE, Mingwu ZHANG, Kim-Kwang Raymond CHOO. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J]. Front. Comput. Sci., 2020, 14(3): 143803-.
[8] Xingyue CHEN, Tao SHANG, Feng ZHANG, Jianwei LIU, Zhenyu GUAN. Dynamic data auditing scheme for big data storage[J]. Front. Comput. Sci., 2020, 14(1): 219-229.
[9] Tianyong WU, Xi DENG, Jun YAN, Jian ZHANG. Analyses for specific defects in Android applications: a survey[J]. Front. Comput. Sci., 2019, 13(6): 1210-1227.
[10] Yan ZHU, Khaled RIAD, Ruiqi GUO, Guohua GAN, Rongquan FENG. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain[J]. Front. Comput. Sci., 2019, 13(6): 1182-1197.
[11] Sa WANG, Yiwen SHAO, Yungang BAO. Practices of backuping homomorphically encrypted databases[J]. Front. Comput. Sci., 2019, 13(2): 220-230.
[12] Wei GAO, Guilin WANG, Kefei CHEN, Xueli WANG. Efficient identity-based threshold decryption scheme from bilinear pairings[J]. Front. Comput. Sci., 2018, 12(1): 177-189.
[13] Lip Yee POR, Chin Soon KU, Amanul ISLAM, Tan Fong ANG. Graphical password: prevent shoulder-surfing attack using digraph substitution rules[J]. Front. Comput. Sci., 2017, 11(6): 1098-1108.
[14] Bartłomiej PŁACZEK. Decision-aware data suppression in wireless sensor networks for target tracking applications[J]. Front. Comput. Sci., 2017, 11(6): 1050-1060.
[15] Chengliang WANG,Yayun PENG,Debraj DE,Wen-Zhan SONG. DPHK: real-time distributed predicted data collecting based on activity pattern knowledge mined from trajectories in smart environments[J]. Front. Comput. Sci., 2016, 10(6): 1000-1011.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed