Secure localization with attack detection in wireless sensor networks

Zhu, Wen Tao, Xiang, Yang, Zhou, Jianying, Deng, Robert H. and Bao, Feng 2011, Secure localization with attack detection in wireless sensor networks, International journal of information security, vol. 10, no. 3, pp. 155-171.

Attached Files
Name Description MIMEType Size Downloads

Title Secure localization with attack detection in wireless sensor networks
Author(s) Zhu, Wen Tao
Xiang, Yang
Zhou, Jianying
Deng, Robert H.
Bao, Feng
Journal name International journal of information security
Volume number 10
Issue number 3
Start page 155
End page 171
Total pages 17
Publisher Springer
Place of publication Heidelberg, Germany
Publication date 2011
ISSN 1615-5262
1615-5270
Keyword(s) attack detection
range-based position estimation
secure localization
sensor network security
Summary Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks, where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known apriori. We address the problem of localizing the regular nodes with range-based location references obtained from certain anchor nodes referred to as beacons, particularly in an adverse environment where some of the beacons may be compromised. We propose an innovative modular solution featuring two lightweight modules that are for dedicated functionalities, respectively, but can also be closely integrated. First, we harness simple geometric triangular rules and an efficient voting technique to enable the attack detection module, which identifies and filters out malicious location references. We then develop a secure localization module that computes and clusters certain reference points, and the position of the concerned regular node is estimated with the centroid of the most valuable reference points identified. Extensive simulations show that our attack detection module can detect compromised beacons effectively, and the secure localization module can subsequently provide a dependable localization service in terms of bounded estimation error. The integrated system turns out to be tolerant of malicious attacks even in highly challenging scenarios.
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category C1 Refereed article in a scholarly journal
HERDC collection year 2011
Copyright notice ©2011, Springer-Verlag
Persistent URL http://hdl.handle.net/10536/DRO/DU:30040613

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 5 times in TR Web of Science
Scopus Citation Count Cited 3 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 91 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Mon, 05 Dec 2011, 12:51:06 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.