Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2009 | Research Article

A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

verfasst von: Honglong Chen, Wei Lou, Xice Sun, Zhi Wang

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

1. Introduction

Wireless sensor networks (WSNs) [1] consist of a large amount of sensor nodes which cooperate among themselves by wireless communications to solve problems in fields such as emergency response systems, military field operations, and environment monitoring systems. Nodal localization is one of the key techniques in WSNs. Most of current localization algorithms estimate the positions of location-unknown nodes based on the position information of a set of nodes (locators) and the internode measurements such as distance measurements or hop counts. Localization in WSNs has drawn growing attention from the researchers, and comprehensive approaches [26] are proposed. However, most of the localization systems are vulnerable under the hostile environment where malicious attacks, such as the replay attack or compromise attack [7], can disturb the localization procedure. Security, therefore, becomes a significant concern of the localization process in hostile environment.
The wormhole attack is a typical kind of secure attacks in WSNs. It is launched by two colluding external attackers [7] which do not authenticate themselves as legitimate nodes to the network. When starting a wormhole attack, one attacker overhears packets at one point in the network, tunnels these packets through the wormhole link to another point in the network, and the other attacker broadcasts the packets among its neighborhood nodes. This can cause severe malfunctions on the routing and localization procedures in WSNs. Khabbazian et al. [8] point out how the wormhole attack impacts on building the shortest path in routing protocols. For the localization procedure under wormhole attacks, some range-free approaches [9, 10] have been proposed. We will propose a range-based secure localization scheme under wormhole attacks in this paper.
To prevent the effect of wormhole attack on the range-based localization, we propose a distance-consistency-based secure localization scheme including three phases: wormhole attack detection, valid locators identification and self-localization. The wormhole attack detection is designed to detect different types of wormhole attacks. For the valid locators identification, different identification schemes are proposed under different wormhole attacks. Both basic approach and enhanced approach are devised using these identification schemes. We formulate the theoretical model to analyze the probability of detecting wormhole attacks and the probability of successfully identifying all valid locators. Simulation results show the effectiveness of our proposed scheme and validate the theoretical results.
As a summary, this paper makes the following contributions:
(i)
a novel wormhole attack detection scheme is proposed to detect the existence of a wormhole attack and to further determine the type of the wormhole attack;
 
(ii)
a basic identification approach is designed to identify the valid locators for the sensor. Two independent algorithms are proposed to handle different wormhole attacks;
 
(iii)
an enhanced identification approach is developed which achieves better performances than the basic approach;
 
(iv)
theoretical analysis on the probability of detecting wormhole attacks and the probability of successfully identifying all valid locators are conducted and verified by simulations.
 
(v)
simulations are conducted to further demonstrate the effectiveness of the proposed secure localization schemes.
 
The remainder of this paper is organized as follows. In Section 2, we discuss the related work on the secure localization. Section 3 describe the network model and the attack model of the system. The secure localization scheme is proposed in Section 4. Section 5 gives the theoretical analysis and Section 6 presents the simulation results. Section 7 concludes the paper and outlines our future work.
The secure localization in hostile environment has been investigated for several years and many secure localization systems have been proposed [11, 12].
To resist the compromise attack, Liu et al. [13] propose the range-based and range-free secure localization schemes, respectively. For the range-based scheme, a Minimum Mean Square Estimation method is used to filter out inconsistent beacon signals. For the range-free scheme, the nodes adopt the voting-based location estimation which can ignore the minor votes imposed by the malicious nodes. SPINE [7] utilizes the verifiable multilateration and verification of positions of mobile devices into the secure localization in the hostile network. The mechanism in [14] introduces a set of covert base stations (CBS), whose positions are unknown to the attackers, to check the validity of the nodes. ROPE [15] is a robust positioning system with a location verification mechanism that verifies the location claims of the sensors before data collection. A suit of techniques in [16] are introduced to detect malicious beacons which can negatively affect the localization of nodes by providing incorrect information. TSCD [17] proposes a novel secure localization approach to defend against the distance-consistent spoofing attack using the consistency check on the distance measurements.
To detect the existence of wormhole attacks, researchers propose some wormhole attack detection approaches. In [18], packet leashes based on the notions of geographical and temporal leashes are proposed to detect the wormhole attack. Wang and Bhargava [19] detect the wormhole attack by means of visualizing the anomalies introduced by incorrect distance measurements between two nodes caused by the wormhole attack. Reference [20] further extends the method in [19] for large scale network by selecting some feature points to reduce the overlapping issue and preserving the major topology features. In [21], a detection scheme is elaborated by checking whether the maximum number of independent neighbors of two nonneighbor nodes is larger than the threshold.
To achieve secure localization in a WSN suffered from wormhole attacks, SeRLoc [9] first detects the wormhole attack based on the sector uniqueness property and communication range violation property using directional antennas, then filters out the attacked locators. HiRLoc [10] further utilizes antenna rotations and multiple transmit power levels to improve the localization resolution. The schemes in [13] can also be applied into the localization against wormhole attacks. However, SeRLoc and HiRLoc need extra hardware such as directional antennae, and cannot obtain satisfied localization performance in that some attacked locators may still be undetected. Reference [13] requires a large amount of computation and possibly becomes incompetent when malicious locators are more than the legitimate ones. In [22], Chen et al. propose to make each locator build a conflicting-set and then the sensor can use all conflicting sets of its neighboring locators to filter out incorrect distance measurements of its neighboring locators. The limitation of the scheme is that it only works properly when the system has no packet loss. As the attackers may drop the packets purposely, the packet loss is inevitable when the system is under a wormhole attack. Compared to the scheme in [22], the distance-consistency-based secure localization scheme proposed in this paper can obtain high localization performance when the system has certain packet losses. Furthermore, it works well even when the malicious locators are more than the legitimate ones, which causes the malfunction of the scheme in [13].

3. Problem Formulation

In this section, we build the network model and the attack model, describe the related definitions, and analyze the effect of the wormhole attack on the range-based localization, after which we classify the locators into three categories.

3.1. Network Model

Three different types of nodes are deployed in the network, including locators, sensors, and attackers. The locators, with their own locations known in advance (by manual deployment or GPS devices), are deployed independently in the network with the probability of Poisson distribution. Each locator has a unique identification. The attackers collude in pairs to launch a wormhole attack to interfere with the self-localization of the sensors. All the nodes in the network are assumed to have the same transmission range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq1_HTML.gif . However, the communication range between two wormhole attackers can be larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq2_HTML.gif , as they can communicate with each other using certain communication technique.
The sensors measure the distances to their neighboring locators using the Received Signal Strength Indicator (RSSI) method; the measurement error of the distance follows a normal distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq3_HTML.gif , where the mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq4_HTML.gif and the standard deviation https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq5_HTML.gif is within a threshold. The sensors estimate their locations using the Maximum Likelihood Estimation (MLE) method [3]: Assume that the coordinates of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq6_HTML.gif neighboring locators of the sensor are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq7_HTML.gif , respectively, and the distance measurements from the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq8_HTML.gif locators to the sensor are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq9_HTML.gif , the location of the sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq10_HTML.gif satisfies
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ1_HTML.gif
(1)
By subtracting the last equation from each of the rest in (1), we can obtain the following equations represented as a linear equation https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq11_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ2_HTML.gif
(2)
Using the MLE method, the location of the sensor can be obtained as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq12_HTML.gif .

3.2. Attack Model

The network is assumed to be deployed in hostile environment where wormhole attacks exist to disrupt the localization of sensors. During the wormhole attack, one attacker sniffs packets at one point in the network and tunnels them through the wormhole link to another point. Being as external attackers that cannot compromise legitimate nodes or their cryptographic keys, the wormhole attackers cannot acquire the content, for example, the type of the sniffed packets. However, the attackers may drop off the received packets randomly which severely deteriorates the sensor's localization process. We assume that the length of the wormhole link is larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq13_HTML.gif so that the endless packet transmission loop caused by both attackers is avoided.
The wormhole attack endured by a node can be classified into duplex wormhole attack and simplex wormhole attack according to the geometrical relation between the node and the attackers. A node is under a duplex wormhole attack when it lies in the common transmission area of these two attackers; a node is under a simplex wormhole attack when it lies in the transmission area of only one of these two attackers but not in the common transmission area of both. Figure 1 shows the impact of the wormhole attack on the distance measurement of the sensor. When measuring the distance, the sensor broadcasts a request signal and waits for the responding beacon signals from the locators within its neighboring vicinity, based on which the sensor can use the RSSI method to estimate the distances to neighboring locators. For the duplex wormhole attack as shown in Figure 1(a), when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq14_HTML.gif sends a beacon message to the sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq15_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq16_HTML.gif will only get the distance measurement as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq17_HTML.gif instead of the actual distance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq18_HTML.gif because the RSSI received by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq19_HTML.gif just reflects the propagational attenuation from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq20_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq21_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq22_HTML.gif 's beacon message, as the packet will travel through two different paths to reach https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq23_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq25_HTML.gif , respectively, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq26_HTML.gif will obtain two distance measurements https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq27_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq28_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq29_HTML.gif 's beacon message, it travels through three paths to reach https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq30_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq31_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq32_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq33_HTML.gif , respectively, thus https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq34_HTML.gif will get three distance measurements as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq35_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq36_HTML.gif . For the simplex wormhole attack as shown in Figure 1(b), when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq37_HTML.gif receives the beacon message from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq38_HTML.gif , it will measure the distance to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq39_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq40_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq41_HTML.gif , two different distance measurements https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq42_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq43_HTML.gif will be obtained. Thus, the locators which can communicate with the sensor via the wormhole link will introduce incorrect distance measurements.
All the locators that can exchange messages with the sensor, either via the wormhole link or not, are called neighboring locators ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq44_HTML.gif -locators) of the sensor. Among these neighboring locators, the ones that can exchange messages with the sensor via the wormhole link are called dubious locators ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq45_HTML.gif -locators), as their distance measurements may be incorrect and distort the localization; the locators that lie in the transmission range of the sensor are called valid locators ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq46_HTML.gif -locators), as the sensor can obtain correct distance measurements with respect to them and assist the localization.
In this paper, we denote the set of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq47_HTML.gif -locators, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq48_HTML.gif -locators, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq49_HTML.gif -locators as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq50_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq51_HTML.gif . For the scenario in Figure 1(a), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq52_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq53_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq54_HTML.gif . It is obvious that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq55_HTML.gif .

4. Secure Localization Scheme Against Wormhole Attack

As the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq56_HTML.gif -locators will negatively affect the localization of the sensor, it is critical for the sensor to identify the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq57_HTML.gif -locators before the self-localization. In this section, we propose a novel secure localization scheme against wormhole attacks, which includes three phases shown in Figure 2, namely the wormhole attack detection, valid locators identification and self-localization.
(i)
Wormhole Attack Detection: The sensor detects the existence of a wormhole attack using the proposed detection schemes, and identifies whether it is under a duplex wormhole attack or a simplex wormhole attack.
 
(ii)
Valid Locators Identification: Corresponding to the duplex wormhole attack and the simplex wormhole attack, the sensor identifies the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq58_HTML.gif -locators using different identification approaches.
 
(iii)
Self-localization: After identifying enough https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq59_HTML.gif -locators, the sensor conducts the self-localization using the MLE method with correct distance measurements.
 

4.1. Wormhole Attack Detection

We assume that each locator periodically broadcasts a beacon message within its neighboring vicinity. The beacon message will contain the ID and location information of the source locator. When the network is threatened by a wormhole attack, some affected locators will detect the abnormality through beacon message exchanges. The following scenarios are considered abnormal for locators: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq60_HTML.gif a locator receives the beacon message sent by itself; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq61_HTML.gif a locator receives more than one copy of the same beacon message from another locator via different paths; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq62_HTML.gif a locator receives a beacon message from another locator, whose location calculated based on the received message is outside the transmission range of receiving locator. When the locator detects the message abnormality, it will consider itself under a wormhole attack. Moreover, if the locator detects the message abnormality under the first scenario, that is, the locator receives the beacon message sent by itself, it will further derive that it is under a duplex wormhole attack. The beacon message has two additional bits to indicate these two statuses for each locator:
(i)
detection bit: this bit will be set to 1 if the locator detects the message abnormality through beacon message exchanges; otherwise, this bit will be 0;
 
(ii)
type bit: this bit will be 1 if the locator detects itself under a duplex wormhole attack; otherwise, this bit will be 0.
 
When the sensor performs self-localization, it broadcasts a Loc_req message to its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq63_HTML.gif -locators. As soon as the locator receives the Loc_req message from the sensor, it replies with an acknowledgement message Loc_ack similar to the beacon message, which includes the ID and location information of the locator. The Loc_ack message also includes above two status bits. When the sensor receives the Loc_ack message, it can measure the distance from the sending locator to itself using the RSSI. The sensor also calculates the response time of each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq64_HTML.gif -locator based on the Loc_ack message using the approach in [17] to countervail the random delay on the MAC layer of the locator: when broadcasting the Loc_req packet, the sensor records the local time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq65_HTML.gif . Every locator gets the local time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq66_HTML.gif by time-stamping the packet at the MAC layer (i.e., the time when the packet is received at the MAC layer) instead of time-stamping the packet at the application layer. Similarly, when responding to the Loc_ack packet, the locator puts the local time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq67_HTML.gif at the MAC layer; both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq68_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq69_HTML.gif are attached in the Loc_ack packet. When receiving the Loc_ack packet, the sensor gets its local time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq70_HTML.gif , and calculates the response time of the locator as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq71_HTML.gif . Note that this response time only eliminates the random delay at the MAC layer of the locators, but not the delay affected by attackers.
When conducting the localization, the sensor may also detect the message abnormality when it receives the Loc_req message sent by itself. Moreover, the sensor can check the detection bit of the Loc_ack message to decide if its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq72_HTML.gif -locator is under a wormhole attack or not.
We propose to use the following two detection schemes for the sensor to detect the wormhole attack.
Detection Scheme D1
If the sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq73_HTML.gif detects that it receives the Loc_req message sent from itself, it can determine that it is currently under a duplex wormhole attack. For example, when the sensor is under the duplex wormhole attack as shown in Figure 1(a), the Loc_req message transmitted by the sensor can travel from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq74_HTML.gif via the wormhole link to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq75_HTML.gif and then arrive at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq76_HTML.gif after being relayed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq77_HTML.gif . Similarly, the Loc_req message can also travel from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq78_HTML.gif through the wormhole link to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq79_HTML.gif and then be received by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq80_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq81_HTML.gif can determine that it is currently under a duplex wormhole attack.
Detection Scheme D2
If the sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq82_HTML.gif detects that the detection bit of the received Loc_ack message from any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq83_HTML.gif -locator is set to 1, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq84_HTML.gif can determine that it is under a simplex wormhole attack. Note that when using detection scheme D2, the sensor may generate a false alarm if the sensor is outside the transmission areas of the attackers but any of its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq85_HTML.gif -locators is inside the transmission areas of the attackers. However, this will only trigger the validate locators identification process but not affect the self-localization result.
The pseudocode of the wormhole attack detection is shown in Algorithm 1. The sensor broadcasts a Loc_req message for self-localization. When receiving the Loc_req message, each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq86_HTML.gif -locator replies a Loc_ack message with the status bits indicating whether it has detected the abnormality. The sensor measures the distances to its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq87_HTML.gif -locators based on the Loc_ack messages using RSSI method and calculates the response time of each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq88_HTML.gif -locator. If the sensor receives the Loc_req message sent by itself (detection scheme D1), it determines that it is under a duplex wormhole attack. Otherwise, if the sensor is informed by any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq89_HTML.gif -locator that the abnormality is detected (detection scheme D2), it declares that it is under a simplex wormhole attack. If no wormhole attack is detected, the sensor conducts the MLE localization.
Algorithm 1: Wormhole attack detection scheme.
1: Sensor broadcasts a Loc_req message.
2: Each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq90_HTML.gif -locator sends a Loc_ack message to the sensor,
including the message abnormality detection result.
3: Sensor waits for the Loc_ack messages to measure the
distance to each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq91_HTML.gif -locator and to calculate the response
time of each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq92_HTML.gif -locator.
4: if sensor detects the attack using scheme D1 then
5: A duplex wormhole attack is detected.
6: else if sensor detects the attack using scheme D2 then
7: A simplex wormhole attack is detected.
8: else
9: No wormhole attack is detected.
10: end if

4.2. Basic Valid Locators Identification Approach

4.2.1. Duplex Wormhole Attack

When detecting that it is currently under a duplex wormhole attack, the sensor tries to identify all its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq93_HTML.gif -locators before the self-localization. Take https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq94_HTML.gif in Figure 1(a) for example, when receiving the Loc_req message from the sensor, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq95_HTML.gif will respond a Loc_ack message to the sensor. As the sensor lies in the transmission range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq96_HTML.gif , the Loc_ack message can be received by the sensor directly. In addition, the Loc_ack message can also travel from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq97_HTML.gif via the wormhole link to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq98_HTML.gif then arrive at the sensor. Therefore, the sensor can receive the Loc_ack message from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq99_HTML.gif for more than once. However, there will be three different scenarios: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq100_HTML.gif the locator lies in the transmission range of the sensor and its message is received by the sensor for three times (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq101_HTML.gif in Figure 1(a)); https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq102_HTML.gif the locator lies out of the transmission range of the sensor and its message is received by the sensor for twice (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq103_HTML.gif in Figure 1(a)); https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq104_HTML.gif the locator lies in the transmission range of the sensor and its message is received by the sensor for twice (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq105_HTML.gif in Figure 1(a)). We can see that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq106_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq107_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq108_HTML.gif -locators, but not https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq109_HTML.gif . The sensor will use the following valid locator identification scheme to find the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq110_HTML.gif -locators.
Identification Scheme I1
When the sensor is under a duplex wormhole attack, if the sensor receives the Loc_ack message of an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq111_HTML.gif -locator for three times and the type bit in the Loc_ack message is set to 1, this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq112_HTML.gif -locator will be considered as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq113_HTML.gif -locator (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq114_HTML.gif in Figure 1(a)). As the sensor only countervails the MAC layer delay of the locators but not that of the attackers when calculating the response time, the message traveling via the wormhole link has taken a longer response time. Thus, the distance measurement based on the Loc_ack message from this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq115_HTML.gif -locator which takes the shortest response time will be considered correct. If the sensor receives the Loc_ack message of an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq116_HTML.gif -locator just twice and the type bit in the Loc_ack message is set to 1, this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq117_HTML.gif -locator will be treated as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq118_HTML.gif -locator (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq119_HTML.gif in Figure 1(a)). For the last scenario, if the sensor receives the Loc_ack message of an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq120_HTML.gif -locator twice and the type bit in the Loc_ack message is set to 0, this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq121_HTML.gif -locator will be considered as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq122_HTML.gif -locator, and the distance measurement based on the Loc_ack message with a shorter response time will be considered as correct (such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq123_HTML.gif in Figure 1(a)).
Distance Consistency Property of Valid Locators
Assuming a set of locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq124_HTML.gif and corresponding measured distances https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq125_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq126_HTML.gif is the location of locator https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq127_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq128_HTML.gif is the measured distance from the sensor to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq129_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq130_HTML.gif . Based on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq131_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq132_HTML.gif , the estimated location of the sensor is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq133_HTML.gif . The mean square error of the location estimation is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq134_HTML.gif . The distance consistency property of valid locators states that the mean square error of the location estimation based on the correct distance measurements is lower than a small threshold while the mean square error of the location estimation based on the distance measurements which contains some incorrect ones is not lower than the threshold.
We can further identify more https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq135_HTML.gif -locators using the distance consistency property of valid locators.
Identification Scheme I2
If the sensor has determined no less than two valid locators using identification scheme I1, it can identify other valid locators by checking whether the distance estimation is consistent. A predefined threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq136_HTML.gif of the mean square error is determined, that is, a distance estimation with a mean square error smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq137_HTML.gif is considered to be consistent. As shown in Figure 1(a), the sensor can identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq138_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq139_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq140_HTML.gif -locators and obtain the correct distance measurements to them. For other undetermined locators, the sensor can identify them one by one. For example, to check whether https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq141_HTML.gif is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq142_HTML.gif -locator, the sensor can estimate its own location based on the distance measurements to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq143_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq144_HTML.gif . As the distance measurement to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq145_HTML.gif is incorrect, the mean square error of the estimated distance measurements may exceed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq146_HTML.gif , which means that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq147_HTML.gif is not a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq148_HTML.gif -locator. When the sensor checks the distance consistency of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq149_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq150_HTML.gif , it can get that the mean square error is lower than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq151_HTML.gif , thus https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq152_HTML.gif is treated as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq153_HTML.gif -locator, and the distance measurement to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq154_HTML.gif is correct. After checking each of the undetermined https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq155_HTML.gif -locators, the sensor can identify all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq156_HTML.gif -locators with the correct distance measurements.

4.2.2. Simplex Wormhole Attack

If the sensor detects that it is under a simplex wormhole attack, it will adopt the following valid locators identification schemes.
Identification Scheme I3
When the sensor under a simplex wormhole attack as shown in Figure 1(b), if the sensor receives the Loc_ack message of an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq157_HTML.gif -locator twice, this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq158_HTML.gif -locator will be considered as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq159_HTML.gif -locator. For example, when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq160_HTML.gif in Figure 1(b) replies a Loc_ack message to the sensor, this message will travel through two different paths to the sensor, one directly from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq161_HTML.gif to the sensor and the other from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq162_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq163_HTML.gif via the wormhole link to the sensor. Therefore, the sensor can conclude that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq164_HTML.gif is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq165_HTML.gif -locator. To further obtain the correct distance measurement to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq166_HTML.gif , the sensor compares the response times of the Loc_ack message from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq167_HTML.gif through different paths, and the distance measurement with a shorter response time is considered correct. Similarly, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq168_HTML.gif can also be identified as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq169_HTML.gif -locator and its correct distance measurement can be obtained.
The following spatial property can also be used to identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq170_HTML.gif -locators:
Spatial Property
The sensor cannot receive messages from two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq171_HTML.gif -locators simultaneously if the distance between these two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq172_HTML.gif -locators is larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq173_HTML.gif .
Identification Scheme I4
When the sensor is under a simplex wormhole attack as shown in Figure 1(b), if the spatial property is violated by two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq174_HTML.gif -locators, it is obviously that one of them is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq175_HTML.gif -locator and the other is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq176_HTML.gif -locator. Take https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq177_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq178_HTML.gif in Figure 1(b) for example, the distance between them is larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq179_HTML.gif , after receiving Loc_ack messages from them, the sensor can detect that the spatial property does not hold by these two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq180_HTML.gif -locators. The response times of both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq181_HTML.gif -locators can be used to differentiate the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq182_HTML.gif -locator from the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq183_HTML.gif -locator. As the Loc_ack message from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq184_HTML.gif travels via the wormhole link to the sensor, it will take a longer response time than that from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq185_HTML.gif . The sensor will regard https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq186_HTML.gif as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq187_HTML.gif -locator and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq188_HTML.gif as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq189_HTML.gif -locator because https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq190_HTML.gif has a shorter response time. The distance measurement to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq191_HTML.gif is also considered correct.
We can also use the distance consistency property of valid locators to identify more https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq192_HTML.gif -locators when the sensor is under a simplex wormhole attack.
Identification Scheme I5
When the sensor is under a simplex wormhole attack, similar to identification scheme I2, if the sensor detects at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq193_HTML.gif -locators using identification schemes I3 and I4, it can identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq194_HTML.gif -locators based on the distance consistency property of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq195_HTML.gif -locators. Take the scenario in Figure 1(b) for example, the sensor can identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq196_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq197_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq198_HTML.gif -locators and obtain the correct distance measurements to them. The sensor can further identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq199_HTML.gif -locators by checking the distance consistency. A mean square error smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq200_HTML.gif can be obtained when the sensor estimates its location based on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq201_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq202_HTML.gif because they are all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq203_HTML.gif -locators. So the sensor can conclude that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq204_HTML.gif is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq205_HTML.gif -locator and the distance measurement to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq206_HTML.gif is correct.
The procedure of basic valid locators identification approach is listed in Algorithm 2: If the sensor detects that it is under a duplex wormhole attack, it will conduct identification scheme I1 to detect https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq207_HTML.gif -locators. As the distance consistency check needs as least three locators, if the sensor identifies no less than two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq208_HTML.gif -locators, it can use identification scheme I2 to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq209_HTML.gif -locators. On the other hand, if the sensor detects that it is under a simplex wormhole attack, it adopts identification schemes I3 and I4 to identify the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq210_HTML.gif -locators. After that, if at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq211_HTML.gif -locators are identified, the sensor conducts identification scheme I5 to detect other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq212_HTML.gif -locators.
Algorithm 2: Basic Valid Locators Identification Approach.
1: if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq213_HTML.gif detects a duplex wormhole attack then
2: Conduct scheme I1 to identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq214_HTML.gif -locators.
3: if the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq215_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq216_HTML.gif 2 then
4: Conduct scheme I2 to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq217_HTML.gif -locators.
5: end if
6: else if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq218_HTML.gif detects a simplex wormhole attack then
7: Conduct schemes I3 and I4 to identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq219_HTML.gif -locators.
8: if the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq220_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq221_HTML.gif 2 then
9: Conduct scheme I5 to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq222_HTML.gif -locators.
10: end if
11: end if

4.3. Enhanced Valid Locators Identification Approach

In the basic valid locators identification approach, if the sensor identifies less than three https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq223_HTML.gif -locators, it will terminate the self-localization because the MLE method used in the self-localization needs at least three distance measurements. However, when using the identification schemes based on distance consistency property of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq224_HTML.gif -locators, many https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq225_HTML.gif -locators may not be identified if the threshold of mean square error, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq226_HTML.gif , is set inappropriately a small value.
To overcome the above problem, we propose an enhanced valid locators identification approach which can adaptively adjust the threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq227_HTML.gif to make the sensor easier to identify more https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq228_HTML.gif -locators: If the sensor detects that it is under a duplex wormhole attack, it conducts identification scheme I1 to detect https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq229_HTML.gif -locators. If the sensor identifies no less than two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq230_HTML.gif -locators, it repeats to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq231_HTML.gif -locators using identification scheme I2 and update the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq232_HTML.gif with an increment of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq233_HTML.gif until at least three https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq234_HTML.gif -locators are identified or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq235_HTML.gif is larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq236_HTML.gif . On the other hand, if the sensor detects that it is under a simplex wormhole attack, it adopts schemes I3 and I4 to identify the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq237_HTML.gif -locators. If at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq238_HTML.gif -locators are identified, the sensor repeats to conduct scheme I5 to detect other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq239_HTML.gif -locators and update https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq240_HTML.gif with an increment of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq241_HTML.gif until at least three https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq242_HTML.gif -locators are identified or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq243_HTML.gif is larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq244_HTML.gif . The procedure of the enhanced valid locators identification approach is listed in Algorithm 3.
Algorithm 3: Enhanced Valid Locators Identification Approach.
1: if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq245_HTML.gif detects a duplex wormhole attack then
2: Conduct scheme I1 to identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq246_HTML.gif -locators.
3: if the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq247_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq248_HTML.gif 2 then
4: repeat
5: Conduct scheme I2 to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq249_HTML.gif -locators.
6: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq250_HTML.gif
7: until the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq251_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq252_HTML.gif 3 or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq253_HTML.gif
8: end if
9: else if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq254_HTML.gif detects a simplex wormhole attack then
10: Conduct schemes I3 and I4 to identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq255_HTML.gif -locators.
11: if the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq256_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq257_HTML.gif 2 then
12: repeat
13: Conduct scheme I5 to identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq258_HTML.gif -locators.
14: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq259_HTML.gif
15: until the identified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq260_HTML.gif -locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq261_HTML.gif 3 or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq262_HTML.gif
16: end if
17: end if
After the wormhole attack detection and valid locators identification, the sensor can identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq263_HTML.gif -locators from its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq264_HTML.gif -locators. Furthermore, the sensor can estimate the correct distance measurements to the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq265_HTML.gif -locators. When the sensor obtains at least three correct distance measurements to its https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq266_HTML.gif -locators, it conducts the MLE localization based on these distance measurements and the locations of the corresponding https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq267_HTML.gif -locators.

5. Theoretical Analysis

In this section, we formulate the mathematical models for the probability of wormhole attack detection and the probability of successfully identifying all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq268_HTML.gif -locators. To simplify our description, we denote the disk centered at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq269_HTML.gif with radius https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq270_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq271_HTML.gif . The overlapped region of the transmission areas of two attackers is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq272_HTML.gif and the overlapped region of the transmission areas of attacker https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq273_HTML.gif and sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq274_HTML.gif is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq275_HTML.gif , which are illustrated in Figure 3.

5.1. Probability of Wormhole Attack Detection

For the probability of the wormhole attack detection, we denote it as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq276_HTML.gif , including the probability of the duplex wormhole attack detection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq277_HTML.gif and the probability of the simplex wormhole attack detection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq278_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ3_HTML.gif
(3)
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq279_HTML.gif , it equals to the probability that the sensor lies in the region https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq280_HTML.gif . Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ4_HTML.gif
(4)
Here,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq281_HTML.gif is the length of the wormhole link.
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq282_HTML.gif , the probability that the sensor lies in region https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq283_HTML.gif in Figure 3 equals to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq284_HTML.gif . When the sensor lies in this region, the sensor can detect the wormhole attack only if at least one locator lies in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq285_HTML.gif or each of the regions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq286_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq287_HTML.gif in Figure 3 has at least one locator, which means that the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq288_HTML.gif -locators can detect the abnormality and inform the sensor. We define the event that at least one locator lies in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq289_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq290_HTML.gif and the event that each of the regions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq291_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq292_HTML.gif in Figure 3 has at least one locator as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq293_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ6_HTML.gif
(6)
As the locators follow Poisson distribution, we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq294_HTML.gif is the density of the locators. Therefore, the probability that the sensor can detect the simplex wormhole attack can be expressed as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ8_HTML.gif
(8)
Therefore, we can get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ9_HTML.gif
(9)

5.2. Probability of Successfully Identifying All https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq295_HTML.gif -locators

For the probability that the sensor can successfully identify all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq296_HTML.gif -locators, we denote it as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq297_HTML.gif . Similarly,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq298_HTML.gif is the probability that the sensor can successfully identify all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq299_HTML.gif -locators when under a duplex wormhole attack, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq300_HTML.gif is for the simplex wormhole attack.
The probability that the sensor is under a duplex wormhole attack equals to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq301_HTML.gif as shown in Figure 3. The sensor is capable of successfully identifying all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq302_HTML.gif -locators under a duplex wormhole attack means that it can identify at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq303_HTML.gif -locators using identification scheme I1. That is, the region https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq304_HTML.gif in Figure 1(a) has at least two locators. Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ11_HTML.gif
(11)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ12_HTML.gif
(12)
and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq305_HTML.gif is the area of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq306_HTML.gif in Figure 1(a). We can approximate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq307_HTML.gif by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ13_HTML.gif
(13)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ14_HTML.gif
(14)
We can get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ15_HTML.gif
(15)
When the sensor is under a wormhole attack, the probability that it lies in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq308_HTML.gif domain in Figure 3 equals to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq309_HTML.gif . When lying in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq310_HTML.gif domain, if the sensor can identify at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq311_HTML.gif -locators using identification schemes I3 and I4, it can successfully identify other https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq312_HTML.gif -locators. Assuming that the sensor can identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq313_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq314_HTML.gif -locators using scheme I3 and identify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq315_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq316_HTML.gif -locators using scheme I4, the probability that the sensor can identify at least two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq317_HTML.gif -locators using schemes I3 and I4 is calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ16_HTML.gif
(16)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ17_HTML.gif
(17)
Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq318_HTML.gif is the region in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq319_HTML.gif which is more than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq320_HTML.gif away from at least one of the locators in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq321_HTML.gif , that is the area of the corresponding shading region https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq322_HTML.gif in Figure 3. Note that if any locator lies in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq323_HTML.gif , the sensor can identify it as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq324_HTML.gif -locator using identification scheme I4.
Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ18_HTML.gif
(18)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ19_HTML.gif
(19)
Therefore, we can obtain
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_Equ20_HTML.gif
(20)

6. Simulation Evaluation

In this section, we present the simulation results to demonstrate the effectiveness of the proposed secure localization scheme and to validate our theoretical results. The network parameters are set as follows: the transmission range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq325_HTML.gif of all types of nodes is identical and is set to 15 m; the density of locators https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq326_HTML.gif /m2 (with the average degree around 4); the standard deviation of the distance measurement https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq327_HTML.gif ; the label https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq328_HTML.gif of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq329_HTML.gif axis denotes the ratio of the length of the wormhole link (i.e., the distance between two attackers) to the transmission range. The threshold for the distance consistency https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq330_HTML.gif . For the enhanced secure localization scheme, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq331_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq332_HTML.gif .
Figure 4 demonstrates the performance comparison of the probability of detecting the wormhole attack between our scheme and SeRLoc scheme. It can be observed that our scheme obtains a good performance with the probabilities higher than 98% for different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq333_HTML.gif . Although both schemes have the similar performance when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq334_HTML.gif , our scheme outperforms SeRLoc scheme, especially when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq335_HTML.gif .
Figure 5 demonstrates the validity of our theoretical analysis on the probability of the wormhole attack detection. We find that the maximum difference between the simulation and the theoretical result is smaller than 0.4%, which indicates that the theoretical result matches the simulation result very well.
Figure 6 shows the performance comparison, in terms of the probability of successful localization, of our proposed basic scheme, SeRLoc scheme, the consistency scheme [13], and the scheme without any detection process when the sensor is under a wormhole attack. The SeRLoc scheme first identifies some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq336_HTML.gif -locators using the sector uniqueness property and communication range violation property, then conducts self-localization based on the rest locators. However, SeRLoc scheme does not distinguish the duplex wormhole attack and simplex wormhole attack, and the communication range violation property may be invalid under the duplex wormhole attack. The consistency scheme identifies the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq337_HTML.gif -locators based on the consistency check of the estimation result. The locator which is the most inconsistent one will be considered as a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq338_HTML.gif -locator. In this simulation, the localization result is considered successful when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq339_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq340_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq341_HTML.gif ) denotes the localization error with (and without) using the secure localization scheme, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq342_HTML.gif is the factor of localization error tolerance (0.1 in our simulations). The performance of the scheme without any detection process shows the severe impact of the wormhole attack on the localization process, which makes the localization totally defunct when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq343_HTML.gif is larger than 2. Figure 6 shows that our proposed scheme obtains much better performance than the other schemes.
In Figure 7, we compare the basic secure localization scheme with the enhanced secure localization scheme. The enhanced scheme outperforms the basic scheme a bit higher (with the maximum improvement of about 3%) when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq344_HTML.gif .
Figure 8 shows the performance of successful localization of the enhanced scheme under different locator densities. It demonstrates that the increase of the locator density has a greater improvement when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq345_HTML.gif than when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq346_HTML.gif .
Figure 9 is to validate the correctness of the theoretical result of the probability of successfully identifying all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq347_HTML.gif -locators. The maximum difference between the simulation and the theoretical result is about 4%, showing that the theoretical result matches the simulation result well.

7. Conclusion and Future Work

In this paper, we analyze the impact of the wormhole attack on the range-based localization. We propose a novel distance-consistency-based secure localization mechanism against wormhole attacks including the wormhole attack detection, valid locators identification and self-localization. To analyze the performance of our proposed scheme, we build the theoretical model for calculating the probability of detecting the wormhole attack and the probability of identifying all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F627039/MediaObjects/13638_2009_Article_1973_IEq349_HTML.gif -locators. We also present the simulation results to demonstrate the out-performance of our schemes and the validity of the proposed theoretical analysis. Although the proposed approach is described based on the RSSI method, it can be easily applied to the localization approaches based on the time-of-arrival (ToA) or time-difference-of-arrival (TDoA) methods.
In the future, our work will focus on the secure localization when the sensor is under multiple wormholes' attack simultaneously. We also intend to consider the secure localization when different nodes have different transmission ranges.

Acknowledgments

This work is supported in part by Grants PolyU 5236/06E, PolyU 5243/08E, A-PJ16, NSFC 60873223, NSFC 90818010, and ZJU-SKL ICT0903.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E: A survey on sensor networks. IEEE Communications Magazine 2002, 40(8):102-114. 10.1109/MCOM.2002.1024422CrossRef Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E: A survey on sensor networks. IEEE Communications Magazine 2002, 40(8):102-114. 10.1109/MCOM.2002.1024422CrossRef
2.
Zurück zum Zitat Savvides A, Han C, Strivastava M: Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 166-179.CrossRef Savvides A, Han C, Strivastava M: Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 166-179.CrossRef
3.
Zurück zum Zitat Zhao M, Servetto SD: An analysis of the maximum likelihood estimator for localization problems. Proceedings of the 2nd International Conference on Broadband Networks (ICBN '05), October 2005, Boston, Mass, USA 59-67. Zhao M, Servetto SD: An analysis of the maximum likelihood estimator for localization problems. Proceedings of the 2nd International Conference on Broadband Networks (ICBN '05), October 2005, Boston, Mass, USA 59-67.
4.
Zurück zum Zitat Bahl P, Padmanabhan VN: RADAR: an in-building RF-based user location and tracking system. Proceedings of the 9th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), March 2000, Tel Aviv, Israel 2: 775-784. Bahl P, Padmanabhan VN: RADAR: an in-building RF-based user location and tracking system. Proceedings of the 9th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), March 2000, Tel Aviv, Israel 2: 775-784.
5.
Zurück zum Zitat Li Z, Trappe W, Zhang Y, Nath B: Robust statistical methods for securing wireless localization in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 91-98. Li Z, Trappe W, Zhang Y, Nath B: Robust statistical methods for securing wireless localization in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 91-98.
6.
Zurück zum Zitat Mao G, Fidan B, Anderson BDO: Wireless sensor network localization techniques. Computer and Telecommunications Networking 2007, 51(10):2529-2553.MATH Mao G, Fidan B, Anderson BDO: Wireless sensor network localization techniques. Computer and Telecommunications Networking 2007, 51(10):2529-2553.MATH
7.
Zurück zum Zitat Capkun S, Hubaux JP: Secure positioning of wireless devices with application to sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005 2: 1917-1928.CrossRef Capkun S, Hubaux JP: Secure positioning of wireless devices with application to sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005 2: 1917-1928.CrossRef
8.
Zurück zum Zitat Khabbazian M, Mercier H, Bhargava VK: Wormhole attack in wireless ad hoc networks: analysis and countermeasure. Proceedings of the Global Telecommunications Conference (GLOBECOM '06), December 2006, San Francisco, Calif, USA Khabbazian M, Mercier H, Bhargava VK: Wormhole attack in wireless ad hoc networks: analysis and countermeasure. Proceedings of the Global Telecommunications Conference (GLOBECOM '06), December 2006, San Francisco, Calif, USA
9.
Zurück zum Zitat Lazos L, Poovendran R: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 2005, 1(1):73-100. 10.1145/1077391.1077395CrossRef Lazos L, Poovendran R: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 2005, 1(1):73-100. 10.1145/1077391.1077395CrossRef
10.
Zurück zum Zitat Lazos L, Poovendran R: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):233-246.CrossRef Lazos L, Poovendran R: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):233-246.CrossRef
11.
Zurück zum Zitat Boukerche A, Oliveira HABF, Nakamura EF, Loureiro AAF: Secure localization algorithms for wireless sensor networks. IEEE Communications Magazine 2008, 46(4):96-101.CrossRef Boukerche A, Oliveira HABF, Nakamura EF, Loureiro AAF: Secure localization algorithms for wireless sensor networks. IEEE Communications Magazine 2008, 46(4):96-101.CrossRef
12.
Zurück zum Zitat Srinivasan A, Wu J: A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications 2007. Srinivasan A, Wu J: A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications 2007.
13.
Zurück zum Zitat Liu D, Ning P, Du W: Attack-resistant location estimation in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 99-106. Liu D, Ning P, Du W: Attack-resistant location estimation in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 99-106.
14.
Zurück zum Zitat Capkun S, Cagalj M, Srivastava M: Secure localization with hidden and mobile base stations. Proceedings of the 25th IEEE International Conference on Computer Communications Societies (INFOCOM '06), April 2006, Barcelona, Spain Capkun S, Cagalj M, Srivastava M: Secure localization with hidden and mobile base stations. Proceedings of the 25th IEEE International Conference on Computer Communications Societies (INFOCOM '06), April 2006, Barcelona, Spain
15.
Zurück zum Zitat Lazos L, Poovendran R, Capkun S: ROPE: robust position estimation in wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 324-331. Lazos L, Poovendran R, Capkun S: ROPE: robust position estimation in wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 324-331.
16.
Zurück zum Zitat Liu D, Ning P, Du W: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), June 2005 Liu D, Ning P, Du W: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), June 2005
17.
Zurück zum Zitat Chen H, Lou W, Ma J, Wang Z: TSCD: a novel secure localization approach for wireless sensor networks. Proceedings of the 2nd International Conference on Sensor Technologies and Applications (SensorComm '08), August 2008, Cap Esterel, France 661-666. Chen H, Lou W, Ma J, Wang Z: TSCD: a novel secure localization approach for wireless sensor networks. Proceedings of the 2nd International Conference on Sensor Technologies and Applications (SensorComm '08), August 2008, Cap Esterel, France 661-666.
18.
Zurück zum Zitat Hu YC, Perrig A, Johnson DB: Packet leashes: a defense against wormhole attacks in wireless networks. Proceedings of the 22nd Annual Conference of the IEEE Computer and Communications Societies (INFOCOM '03), April 2003, San Franciso, Calif, USA 3: 1976-1986. Hu YC, Perrig A, Johnson DB: Packet leashes: a defense against wormhole attacks in wireless networks. Proceedings of the 22nd Annual Conference of the IEEE Computer and Communications Societies (INFOCOM '03), April 2003, San Franciso, Calif, USA 3: 1976-1986.
19.
Zurück zum Zitat Wang W, Bhargava B: Visualization of wormholes in sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSec '04), 2004, New York, NY, USA 51-60. Wang W, Bhargava B: Visualization of wormholes in sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSec '04), 2004, New York, NY, USA 51-60.
20.
Zurück zum Zitat Wang W, Lu A: Interactive wormhole detection and evaluation. Information Visualization 2007, 6(1):3-17. Wang W, Lu A: Interactive wormhole detection and evaluation. Information Visualization 2007, 6(1):3-17.
21.
Zurück zum Zitat Maheshwari R, Gao J, Das SR: Detecting wormhole attacks in wireless networks using connectivity information. Proceedings of the 26th Annual IEEE Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 107-115. Maheshwari R, Gao J, Das SR: Detecting wormhole attacks in wireless networks using connectivity information. Proceedings of the 26th Annual IEEE Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 107-115.
22.
Zurück zum Zitat Chen H, Lou W, Wang Z: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing (UIC '09), July 2009, Brisbane, Australia Chen H, Lou W, Wang Z: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing (UIC '09), July 2009, Brisbane, Australia
Metadaten
Titel
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
verfasst von
Honglong Chen
Wei Lou
Xice Sun
Zhi Wang
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/627039

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe