Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.
Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E: A survey on sensor networks. IEEE Communications Magazine 2002, 40(8):102-114. 10.1109/MCOM.2002.1024422 CrossRef
Savvides A, Han C, Strivastava M: Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 166-179. CrossRef
Zhao M, Servetto SD: An analysis of the maximum likelihood estimator for localization problems. Proceedings of the 2nd International Conference on Broadband Networks (ICBN '05), October 2005, Boston, Mass, USA 59-67.
Bahl P, Padmanabhan VN: RADAR: an in-building RF-based user location and tracking system. Proceedings of the 9th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), March 2000, Tel Aviv, Israel 2: 775-784.
Li Z, Trappe W, Zhang Y, Nath B: Robust statistical methods for securing wireless localization in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 91-98.
Mao G, Fidan B, Anderson BDO: Wireless sensor network localization techniques. Computer and Telecommunications Networking 2007, 51(10):2529-2553. MATH
Capkun S, Hubaux JP: Secure positioning of wireless devices with application to sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005 2: 1917-1928. CrossRef
Khabbazian M, Mercier H, Bhargava VK: Wormhole attack in wireless ad hoc networks: analysis and countermeasure. Proceedings of the Global Telecommunications Conference (GLOBECOM '06), December 2006, San Francisco, Calif, USA
Lazos L, Poovendran R: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 2005, 1(1):73-100. 10.1145/1077391.1077395 CrossRef
Lazos L, Poovendran R: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):233-246. CrossRef
Boukerche A, Oliveira HABF, Nakamura EF, Loureiro AAF: Secure localization algorithms for wireless sensor networks. IEEE Communications Magazine 2008, 46(4):96-101. CrossRef
Srinivasan A, Wu J: A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications 2007.
Liu D, Ning P, Du W: Attack-resistant location estimation in sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 99-106.
Capkun S, Cagalj M, Srivastava M: Secure localization with hidden and mobile base stations. Proceedings of the 25th IEEE International Conference on Computer Communications Societies (INFOCOM '06), April 2006, Barcelona, Spain
Lazos L, Poovendran R, Capkun S: ROPE: robust position estimation in wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 324-331.
Liu D, Ning P, Du W: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), June 2005
Chen H, Lou W, Ma J, Wang Z: TSCD: a novel secure localization approach for wireless sensor networks. Proceedings of the 2nd International Conference on Sensor Technologies and Applications (SensorComm '08), August 2008, Cap Esterel, France 661-666.
Hu YC, Perrig A, Johnson DB: Packet leashes: a defense against wormhole attacks in wireless networks. Proceedings of the 22nd Annual Conference of the IEEE Computer and Communications Societies (INFOCOM '03), April 2003, San Franciso, Calif, USA 3: 1976-1986.
Wang W, Bhargava B: Visualization of wormholes in sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSec '04), 2004, New York, NY, USA 51-60.
Wang W, Lu A: Interactive wormhole detection and evaluation. Information Visualization 2007, 6(1):3-17.
Maheshwari R, Gao J, Das SR: Detecting wormhole attacks in wireless networks using connectivity information. Proceedings of the 26th Annual IEEE Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 107-115.
Chen H, Lou W, Wang Z: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing (UIC '09), July 2009, Brisbane, Australia
- A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
- Springer International Publishing
- EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com