Next Article in Journal
Measurement of the Verdet Constant of Polarization-Maintaining Air-Core Photonic Bandgap Fiber
Previous Article in Journal
Discrimination of Transgenic Maize Kernel Using NIR Hyperspectral Imaging and Multivariate Data Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Localization in the Presence of Colluders in WSNs

1
School of Information Technology, Faculty of Engineering and Design, Carleton University, Ottawa, ON K1S 5B6, Canada
2
School of Computer Science, Carleton University, Ottawa, ON K1S 5B6, Canada
3
Institut Mines-Telecom, Paris-Saclay University, Telecom SudParis, CNRS Samovar UMR 5157, 9 Rue Charles Fourier, 91000 Evry, France
4
Nokia Networks, 600 March Road, Ottawa, ON K2K 2T6, Canada
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(8), 1892; https://doi.org/10.3390/s17081892
Submission received: 21 June 2017 / Revised: 28 July 2017 / Accepted: 11 August 2017 / Published: 17 August 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
We address the challenge of correctly estimating the position of wireless sensor network (WSN) nodes in the presence of malicious adversaries. We consider adversarial situations during the execution of node localization under three classes of colluding adversaries. We describe a decentralized algorithm that aims at determining the position of nodes in the presence of such colluders. Colluders are assumed to either forge or manipulate the information they exchange with the other nodes of the WSN. This algorithm allows location-unknown nodes to successfully detect adversaries within their communication range. Numeric simulation is reported to validate the approach. Results show the validity of the proposal, both in terms of localization and adversary detection.

1. Introduction

In a wireless sensor networks (WSNs), several small devices (hereinafter referred to as sensor nodes) collaboratively exchange information. Most existing WSN applications include environmental monitoring [1] and tracking of goods and people [2]. WSNs usually work in a hostile environment. Therefore, they are vulnerable to various malicious attacks such as cyber attacks [3] and wormhole attacks [4]. In several WSN applications, the ability to localize a sensor plays a critical role [4,5,6,7,8,9,10,11].
Most of these applications are complemented by geographic routing and location-based authentication which, in turn, require node position determination techniques. If such a process does not include security measures, the WSN will eventually suffer from location-based threats conducted by adversarial scenarios, including both Sybil and sinkholing attacks [12,13]. Attacks to the localization process may successfully interfere with the objectives of a given WSN application. Consider, for instance, a WSN-based system that monitors forest fires. Localization errors can incorrectly report in which precise geographic area to intervene. Similarly, erroneous positioning in critical infrastructure scenarios can report incorrect information to security and safety operators. It is thus crucial to use a secure localization algorithm, in order to guarantee the accuracy of the reported position of the nodes of a WSN.
Localization involves two steps: first, acquiring data, and then conducting position calculation. During either of these two steps, an (internal or external) [14] attack can disrupt the localization process by having a node either sending false information or by simply replaying data previously obtained under normal operations. Either case may disrupt the system, since the network may end up with nodes advertising geographical positions that have been wrongly computed. Security measures have been created to mitigate the impact of these attacks. However, issues pertaining to collusion remain: (1) How do colluders work together? and (2) To which extent can they interfere with the localization process?
Collusion may take many forms in a WSN. Collaborating attackers could announce false information in a coordinated manner and/or position themselves into evasion patterns (for example to disclose collinear positions that fool detection). Both cases may result in calculating an incorrect position for a node. Additionally, such attackers could target other data such as the reputation lists used in several locational algorithms [15,16,17,18]. Such a possibility is downplayed in current approaches to localization. Indeed, it is often assumed that (a) such reputation lists are incorruptible and that (b) coordination of adversarial nodes does not affect the localization process. Some existing studies do consider collusion, that is, they assume that a group of malicious sensor nodes does collaborate to alter the information they exchange with (i.e., receive from and forward to) other nodes. They number few and are limited. Let us elaborate.
First consider the situation where the adversaries evade detection by positioning themselves at ‘blind’ positions of the detection algorithm [16]. For example, an evil ring attacker era (ibid.) fools location-unknown nodes that rely on trilateration to compute their geographic location using era’s position. Such an attack is not detectable by algorithms that detect simple liars, where a ‘simple liar’ is taken to be a sensor that sends out randomly generated fake coordinates to its neighbours. We have presented elsewhere [16,19] an algorithm able to detect and handle a single evil ring attacker. We emphasize that this algorithm cannot handle localization in the presence of multiple evil ring attackers. We also remark that the few techniques that exist in the literature to handle colluders (hereafter also referred to as colluding attackers or colluding sensors) cannot handle the evil ring attack.
Next, let us understand other limitations of existing algorithms for handling colluders. Typically, these algorithms assume the existence of trusted third parties (e.g., a trusted base station, such as in [20]). This is problematic for several reasons. First, the trusted third parties must periodically broadcast positioning validation data to all the system nodes. Second, the only element of the system that can detect colluders is, in fact, the trusted third party. Third, these solutions require secure communication to the third party, which does not allow for decentralized processing (though this is an key requirement for WSNs). In turn, this imposes an important overhead and complexity on the final system. Also, heavy traffic to and from the base station is likely to compromise the lifespan of neighbour nodes. Ultimately, relying on a trusted third party (which, in effect, disables true distributed processing) and failing to handle attacks such as the evil ring one, completely jeopardizes such solutions. Instead, what is required is a distributed algorithm enabling the detection of colluders (including evil ring attackers) by the nodes of a WSN in a totally decentralized way [7,21].
In this paper, we present such an algorithm, which proceeds from our previous work on the evil ring attack. Most importantly, like other studies addressing localization in the presence of colluders, such colluders are allowed to alter not only coordinates but also other messages used for localization [22]. In our approach, any location-unknown node is able to identify in a decentralized way colluders within its communication range.
The rest of the paper is organized as follows. A review of the literature is conducted in Section 2, with a brief overview of our work on the evil ring attack and how it is different from the algorithm we present here. Section 3 provides the background, model and assumptions of the detection algorithm originally published in [19] for the case of a single evil ring attacker [19]. It also introduces a colluding attack model that includes three categories of colluding attackers. Section 4 presents our solution for detecting the presence of any of these three categories of colluding attackers and Section 5 provides a detailed correctness analysis of the proposed algorithm. In Section 6 we discuss our comprehensive set of simulation results. Section 7 concludes the paper.

2. Related Work

The impact of the wormhole attack on the DV-Hop localization algorithm is analysed in [4]. Based on the analysis results, a label-based DV-Hop secure localization scheme is proposed to defend against the wormhole attack. The proposed scheme assumes an ideal and homogeneous communication range for all the sensors. The simulation results prove the effectiveness of the proposed scheme.
A secure and scalable geographic opportunistic routing (SGOR) protocol [7] is proposed to defend against a wide range of attacks. SGOR employs a distributed location verification algorithm to address the location-spoofing attack. In order to detect this attack, the sensor nodes exchange messages between them and records the received signal strength (RSS) measurements. In the routing layer, an indirect trust model is proposed to response to different attacks based on the location verification algorithm. Simulation results prove that SGOR has an excellent performance with acceptable overhead under various attacks.
Another secure region-based geographic routing (SRBGR) protocol is proposed in [23]. The basic idea behind SRBGR is to increase the number of legitimate nodes participating in communication process when the number of attackers increases by applying different message contention priorities. SRBGR uses a bound dynamic window to provide sufficient collection time for packets. It also uses the verification cost to validate node’s location in order to identify and isolate the attacker during priority selection criteria. Simulation results demonstrate that SRBGR increases the network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and blackhole attacks.
A secure and reliable prediction-based target tracking (SRPTT) protocol [6] is proposed to consider both security and object tracking tasks simultaneously. The basic idea behind SRPTT is to ensure security using reputation based trust concept for individual sensor nodes. The possible attack scenarios for SRPTT are analysed and simulation results show that the proposed protocol allows the network to retain the reliability of tracking data even in the presence of compromised nodes, thereby achieving secure and reliable object tracking process.
The work in [24] analyses existing techniques for collusion prevention. Results show their inadequacy for prevention of colluders in WSN scenarios. The work in [25] addresses bounded errors conditions to guarantee the security of the process conducted by sensor nodes using a two-dimensional distance-based estimation process, executed in the presence of cheating beacon nodes. Three algorithms driven by distance-based techniques are developed to guarantee bounded error localization under cheating beacons. Cheating beacons are defined as beacons providing a false distance between nodes. The goal of the attackers generating the cheating beacons is to lead location-unknown nodes to miscalculate their position. Accuracy and efficiency of the algorithms are measured via numeric simulation.
A positioning process called tolerant majority colluding attacks (TMCA) [18] assumes the cooperation of non-beacon WSN neighbour nodes in order to address adversarial scenarios such as wormholes, replay and Sybil attacks. TMCA is validated under situations where the number of malicious nodes is larger than the number of benign nodes. TMCA allows location-unknown nodes to compute their position using distance bounding techniques. The underlying technique relies on the use of maximum likelihood estimation, in order to correlate the coordinates and the distance measurements received from a reference beacon. Authors in [24] observed a lack of evidence with regard to collaboration (e.g., amount of exchanges) or collusion of adversarial nodes in TMCA.
The authors in [24] also illustrate attack possibilities in some other protocols similar to TMCA reported in [26]. The following observations are made. First, provers must properly compute their distance with regard to honest verifiers, including those situations in which adversaries exist. Second, provers must compute upper bounds on their distance to dishonest verifiers, also including situations where colluders do exist. If the aforementioned premises hold, then provers may mutually authenticate verifiers by using cryptographic solutions (global synchronization of messages is required).
Positioning algorithms in [27,28,29] enable location-unknown nodes to geolocate their coordinates in a WSN despite the presence of malicious anchor nodes lying about their position in the network. A first algorithm, referred to as majority-three neighbour signals, uses trilateration to calculate the position of location-unknown nodes [30]. The algorithm relies on the use of majority decision rules to obtain the positions. Triplets determining a location in disagreement with the majority are considered to contain malicious anchor nodes. In [16], an attack referred to as evil ring is presented against the majority-three neighbour signals algorithm. Attackers are assumed to provide wrong positions, while remaining undetectable by the majority-three neighbour signals since the victims of the attack derive consistent positions with the majority. When asked, the malicious nodes report fake positions that sit on a circle centred at the victim’s location and with a radius corresponding to the distance separating attackers and victims. The calculation of the distance between attackers and victims remains consistent. Thus, location-unknown sensor nodes correctly determine their location but fail at properly identifying the position of that malicious node. This is because an evil ring attacker is a ‘smart liar’ that does not merely send out randomly generated fake coordinates to its neighbours (which is what a simple liar does). Instead, an evil ring attacker computes a special location that will further interfere with the localization computation of other sensors. Such behaviour is undetectable by any sensor running any of the previous detection algorithms that use trilateration to determine sensor position and detect liars.
The algorithm presented in [16] handles the localization issue by cross-checking the information provided by an evil ring attacker. More precisely, the solution relies on requesting the locations of all neighbouring nodes and computing every possible three-neighbour combination using majority decision rules. Then, a list is created to store all those triplets that agree with the majority. The computed position and the cross-check lists are broadcasted to neighbours, which allows for the detection of the evil ring attacker (i.e., the smart liar). Sensor nodes wait until they receive the equivalent lists from two other neighbours and compare the results. Every neighbouring node that is consistently reported with the same position in the three lists is reported as truth-teller—or as a liar otherwise.
The proposals presented in [16,27,28,29] assume collusion-free dense networks. The absence of collusion in TMCA and in the evil ring attack is a typical assumption. As previously mentioned, very few studies pertaining to secure localization have investigated attacks perpetrated by colluders.
Let us consider models that do address collusion, for example, the solution presented in [31]. This solution assumes location information that can be received and forwarded by collaborating malicious nodes. However, as mentioned in the previous section, this solution fails to detect an evil ring attack and has other limitations.

3. Background, Models and Assumptions

Let K be the complete set of location-known sensor nodes in a WSN. These nodes know their position in the system beforehand. They may be an anchor node (e.g., nodes that were manually configured by operators of the system) or may use a GPS for self-positioning [32,33] or may have their location computed a priori. Conversely, let U be the set of location-unknown sensor nodes that will try to determine their own position in the system by collaborating with other nodes within their communication range. We assume that all the sensor nodes are deployed on a two-dimensional plane. Sensor nodes K are assumed to be either truth-tellers (i.e., never intentionally provide false information to neighbours); or liars [16] that can intentionally lie about their location in the system.
In the presence of liars, exact boundaries about the exact number of location-known neighbours required to correctly conduct the location process exist [16]. For instance, results reported in [27,28,29] provide different boundaries with regard to the exact adversary models and robustness of the process. The higher the robustness, the lower number of liars that might be handled by the localization process. The following boundary provides an example under worst case adversaries and highest robustness level:
| N | 3 > 2 3 + | N | - 1 · 2 + | N | - 2 · 1
where | N | is the number of neighbouring nodes of a location-unknown node conducting the process, out of which exactly nodes are liars. According to the previous function, seven nodes are required in case the number of liars is exactly one (cf. [29] for further details); 11 nodes in the case of two liars; 16 nodes in case of three liars; and so on.
Now, in order to address collusion, let C K denote a set of colluders that jointly perpetrate an attack. A location-known node C i C is not only a liar (i.e., inasmuch as it systematically reports a fake location to other sensor nodes in the network) but can also send out other false information, such as fake lists about its neighbouring nodes. We emphasize, once more, that the presence of such colluders in a WSN invalidates existing solutions for secure localization.
Definition 1.
Sensors A and B have bi-directional communication if both A is in B’s communication range and A is in B’s communication range, as illustrated in Figure 1a. They have no communication if neither A nor B is in the communication range of the other, as illustrated in Figure 1b. They have single direction communication if either only A is in B’s communication range or vice versa, as illustrated in Figure 1c.
We propose an algorithm to allow a sensor A to obtain its own position in the system and detect colluders that are within its bi-directional communication range despite the presence of these colluders. Such detection requires understanding the nature of threats (jeopardizing the accuracy of the localization process) originating from colluders. Clearly, reducing communications between sensor nodes limits the likelihood of such threats succeeding. Consequently, in our proposed algorithm, the only messages we allow between sensor nodes consist in their coordinates and a series of verification lists (hereafter denotes as cross-check lists or CCLs for short). We do assume periodic exchanges between neighbours (e.g., to exchange routing data) are secured and cannot be attacked.
Every node is identified by its coordinates. Authentication (via identity theft) and data integrity may be compromised in a colluding attack. It is important to note that our proposed solution does not rely on any form of authentication nor cryptography.
Our solution identifies three categories of colluders. All attacks we consider depend on a corrupted CCL being sent. Which category an attacker belongs to depends on how it reports its location. A category one attacker lies by supplying fake locations generated at random. A category two attacker provides fake location in cooperation with two other malicious nodes, without aiming at escaping detection. For instance, we include in this category nodes that may provide false locations in order to affect the positioning process of those location-unknown sensor nodes requesting collaboration from their neighbours Such colluders do not implement any attack techniques to evade detection from neighbouring nodes. Finally, category three attackers consistently lie in cooperation with other colluders, with the goal of misleading the positioning process of location-unknown nodes, as well as enforcing techniques to evade detection. Category three attackers are assumed to conduct evil ring attack techniques (reported in [16]), for example by reporting false positions on a circle centred at the victim’s location and of a radius corresponding to the distance between the attacker and victim. Finally, we emphasize that colluders of all three categories can compromise data integrity, for example by forging colluded CCLs.
Let r A denote the communication range of a location-unknown sensor A. Let d A be a disc of radius r A centered at A. Let K K be a location-known sensor with communication range r K . Let d K be a disc of radius r K centred at K. Let l denote the number of truth-telling sensors that: (1) are in the intersection of d A and d K ; and (2) have bi-directional communication with both A and K. Let m denote the exact amount of colluders that intersect d A and d K . We postulate that for A to systematically detect all colluders, the number of truth-telling sensors l should be at least two more than m. In what follows, we present algorithmic solutions to address the third category of colluders, which are not detectable by previous algorithms in the literature. We emphasize that algorithms that can handle colluders of category three clearly can also handle the two other categories of colluders.

4. Super Cross-Check (SCC) Algorithm

Algorithm 1 outlines the steps of super cross-check (SCC). It assumes a sensor node A that executes two main processes. First, it tries to compute a consistent position in the system by requesting the position of every location-known sensor node in its neighbourhood Then, it labels its neighbours as either truth-tellers or colluders. The main steps to identify the colluders are the following. Once node A computes its position, it creates a cross-check list (CCL) for every neighbour in K . Then, node A exchanges its CCL with those sensor nodes in its communication range, in order to identify colluders. Upon request, every neighbour of A sends out its CCL. Only colluders would send CCLs with wrong information (with respect to the truthful information provided by the truth-tellers). For example, a colluder may purposely include false positions about nodes that should have been excluded from its CCL. If enough colluders collectively report exactly the same information, then node A will be deceived. The attack can be detected by using a traditional voting technique. Upon receiving a CCL from each neighbour, A computes for every neighbour either positive and negative scores. If a neighbour received two more positive scores than negative scores, then A concludes that such a node is a truth-teller. Otherwise, the node would be labelled as a colluder. In Figure 2 we provide a detailed example illustrating how algorithm SCC works.
Algorithm 1 Super cross-check (SCC)
1:repeat
2:    // sensor A requests the location of all its neighbours and computes the point of
3:    // intersection ( x t , y t ) for each triplet t of nodes B i , B j , B k in its neighbourhood;
4:until a consistent position is derived from the majority of triplets;
5:Once the above process returns a consistent position
6:// sensor A accepts ( x t , y t ) as its position in the system, adds every triplet
7:// ( B i ; B j ; B k ) in agreement with ( x t , y t ) to its cross-check list (CCL), and
8:// broadcasts both its location ( x t , y t ) and its CCL to all its neighbours;
9:repeat
10:    // sensor A requests the CCL of each neighbour and includes the information in a set K;
11:until all the neighbours of A are processed
12:for each node in K whose communication circle intersects with A do
13:    if the node is reported in both the CCL of A and the CCL of A’s neighbours then
14:        // the node gets a positive score;
15:    else
16:        // the node gets a negative score;
17:    end if
18:end for
19:for each node in K whose communication circle intersects with A do
20:    if the node has twice positive scores than negative scores then
21:        // the node is labelled as a truth-telling node
22:    else
23:        // the node is labelled as a colluder
24:    end if
25:end for

5. Correctness Analysis

We demonstrate that a colluder is uncovered by Algorithm 1, despite its insertion in the CCL of A.
Lemma 1.
A location-unknown sensor A executing Algorithm 1 detects all in-range colluders.
Proof. 
Let A i be a colluder. According to Lines 1–11 in Algorithm 1, the false coordinates of A i are listed in the CCL of A. In the intersection of the discs d A i and d A , let l be the number of truth-telling sensors and m be the number of attackers colluding with A i . We assume that l m + 2 and that each of these l truth-telling sensor node has bi-directional communication with A. In the worst case, the false coordinates of A i are present in the CCL of m colluders. It is proved in [16] Lemma 2 that A i can fool a maximum of two truth-telling sensors (e.g., U i and U j in Figure 3). This means that there is potentially another truth-telling sensor node attacked by A i . If this happens, then node A i is included in the CCL of that truth-telling sensor node. Hence, A receives from its neighbours a maximum of m + 1 CCLs including A i . According to Lines 12–18 in Algorithm 1, A gives a positive credit at most m + 1 times and a negative credit at most l - 1 times to A i . Since i m + 2 , we have that l - 1 m + 1 . Therefore, more negative credits than positive credits are attributed to A i . According to Lines 19–25 in Algorithm 1, A i is declared a colluder by A. ☐
Lemma 2.
A location-unknown sensor A executing Algorithm 1 detects all in-range truth-telling sensor nodes, when the number of truth-telling sensor nodes i is at least two more units greater than j, the number of colluders.
Proof. 
If B is a truth-telling sensor node, it should be present in the CCLs of l truth-telling sensor nodes in the intersection of the discs d A and d B . In the worst case, all m colluders remove the coordinates of B from their CCLs. According to lines 12–18 in Algorithm 1, A assigns l positive credits and m negative credits to B. Given the number of truth-telling sensors l is at least two more units greater than m, namely, l m + 2 , and according to lines 19–25 in Algorithm 1, A will declare B as a truth-telling sensor. ☐
From Lemmas 1 and 2, we derive the following theorem:
Theorem 1.
A location-unknown sensor A executing Algorithm 1 detects all in-range colluders and truth-telling node sensors.

6. Experimental Results

We present in this section some numeric simulation results. We implemented our algorithms and scenarios under the OMNeT++ framework [34]. Two different set of simulations are reported hereinafter. First, we assume scenarios where the sensor nodes are uniformly deployed. Second, we assume a random deployment of nodes. We assume that a neighbourhood of over 30 active nodes creates a major interference condition and makes communications ineffective. The performance of the SCC algorithm is evaluated as follows. We measure and compare the successful detection colluders with regard to the performance and cost of the cross-check (CC) algorithm presented in [16]. The CC algorithm is reproduced in our work as Algorithm 2, for the convenience of readers (see [16] and citations thereof, for the correctness and complexity analysis of Algorithm 2).
Algorithm 2 Cross-Check (CC)
1:repeat
2:    // sensor A requests the location of all its neighbours and computes the point of
3:    // intersection ( x t , y t ) for each triple t of nodes B i , B j , B k in its neighbourhood;
4:until a consistent position is derived from the majority of triplets;
5:// sensor A accepts ( x t , y t ) as its position in the system, adds every triplet
6:// ( B i ; B j ; B k ) in agreement with ( x t , y t ) to its cross-check list (CCL), and
7:// broadcasts both its location ( x t , y t ) and its CCL to all its neighbours;
8:repeat
9:    // sensor A requests the CCL of its neighbours;
10:until consistency of A’s CCL and two CCLs from two different neighbours
11:for each node B i in A’s neighbourhood do
12:    if the position of B i is consistent in all three CCLs then
13:         B i is labelled as a truth-teller and is added to the neighbourhood list of A;
14:    else
15:         B i is labelled as a colluder and is excluded from A’s neighbourhood list;
16:    end if
17:end for

6.1. First Set of Simulations: Uniform Deployment of Nodes

In this first set of simulations, we assume that a set of sensor nodes is uniformly deployed. Figure 4 depicts this scenario, where solid black dots are representing the anchor (i.e., sensor nodes equipped with GPSs) nodes (e.g., A, C, D, E), and grey dots represent regular location-known sensors (e.g., B). The communication range of an anchor node is assumed to be 2 d , where d equal to the distance between an anchor and any of its surrounding location-known sensor nodes. The communication range of a regular location-known sensor is 2 d .
Any anchor node or regular sensor node may be a colluder. White-patterned-black dots represent location-unknown sensor nodes, e.g., sensor U. The communication range of a location-unknown sensor node is also 2 d . We consider the worst case, in which the third category of colluders defined in Section 3 conduct the attacks. Under this scenario, node U (assumed to be a node that initially does not know its own position in the WSN) succeeds at detecting the attack of B if there are at least two more truth-tellers placed within the intersection of discs d B and d U (respectively centred at B and U) than the number of colluders.
Simulation results are presented in Figure 5a and Figure 6. Each simulation represents the deployment, on a 12-cell grid, of 99 location-known nodes (20 sensor nodes are anchors and the remainder 79 are regular location-known nodes) and 12 location-unknown sensor nodes. Any location-known sensor can be a colluder. At every run, attackers are distributed randomly and uniformly within every cell of the grid (e.g., cells depicted as A C D E in Figure 4). Figure 5a shows the detection rate of location-unknown nodes that successfully detect colluders after executing algorithm CC or SCC, under the uniform sensor deployment scenario with incremental percentage of location-known sensors acting as colluders ranging from 10% to 90%. Results are measured using 100 runs per each percentage-of-attackers case and 95% confidence intervals. Success means that all colluders in the neighbourhood of a location-unknown node (executing either the CC or SCC algorithm) are successfully removed from the final list of truth-telling nodes. Figure 6 shows different types of failures when executing each algorithm under the uniform sensor deployment scenarios. Counted failures are cases in which either colluders are not properly removed from the final list of truth-telling nodes or when the final list ends being wrongly empty. Failures are due to the fact that the detection rate of both algorithms is not always 100% in our simulations. This is because in our simulations, we are not filtering out topologies in which the hypotheses of the algorithms are not met. In order to maximize the detection rate for SCC, the rate of category three colluders among all other colluder types shall be inversely proportional to the rate of colluders among all anchor nodes. Since attackers are distributed randomly and uniformly in every simulation run, a percentage increase of colluders also represents an increase of detection failure due to hypothesis violations (e.g., percentage of truth-telling nodes less than twice the percentage of colluders in the intersection of discs d A and d B centred at A and B in Figure 4). The advantage curve in Figure 5a represents the difference between the success rates of SCC and CC. It confirms that the detection success rate of SCC always outperforms that of CC. Looking at Figure 6, we can observe that the performance increase responds to the coverage of the colluding factor, so that more combinations of attackers are identified and removed from the final list of truth-telling nodes.

6.2. Second Set of Simulations: Random Deployment of Nodes

In this section, we report numeric simulation in which all sensor nodes, both regular location-known and location-unknown nodes, are positioned at random. As in the uniform deployment case, any regular location-known sensor can be a colluder. Figure 7 depicts a sample random deployment of 44 sensor nodes, consisting of 34 location-known nodes and then nodes of type location-unknown. Of the 34 location-known nodes, 15 are acting as colluder nodes. Black-patterned white dots represent location-unknown nodes executing algorithm CC or SCC. White-patterned black dots represent regular location-known nodes acting as truth-telling sensors. Finally, grey dots represent colluder nodes. Solid black circles represent the communication range of the location-unknown sensor nodes.
Figure 5b contains the simulation results. Each simulation corresponds the deployment of eighty nodes of type non-colluders, and ten nodes of location-unknown type. An incremental number of additional location-known sensors act as colluders. The percentage of colluders is presented in proportion to the number of location-known sensors acting as truth-telling nodes (e.g., 10 % of colluders means a WSN with eight location-known sensors acting as colluders in addition to the eighty nodes of type location-known acting as non-colluders; and ten regular nodes of type location-unknown). Results focus on the worst case, i.e., the case in which colluders are positioned randomly and uniformly within the WSN. Results are measured using 100 runs per percentage-of-attacker case and 95% confidence intervals. The SCC and CC curves in Figure 5b show the success rate of randomly positioned location-unknown nodes at detecting colluders after executing either algorithm. Success means that all neighbouring attackers of a location-unknown sensor node are successfully identified and removed from a final list of truth-telling nodes prior computation of the routing tables. The advantage curve in Figure 5b represents the difference between the success rate of SCC and CC. We can see from this curve that the detection success rate of SCC is superior to the detection success rate of CC under the random sensor deployment scenario. The very narrow 95% confidence intervals of the simulation results reflect the stability of the two algorithms in the random case.

6.3. Comparative Evaluation on Cost

Figure 8 plots the average number of neighbours per location-unknown node, plus the 95% confidence intervals in each scenario. As expected, the number is always below 30 active neighbours In the uniform deployment simulations, the number of active neighbours per location-unknown nodes is always 12 neighbours This is because, in the uniform case, location-unknown nodes are always covered by four anchors and eight regular (non-anchor) location-known nodes. In the random case, there is no predetermined number of location-known nodes covering a location-unknown node. We recall that the topologies in the random deployment case consist of the random placement of exactly 80 non-colluders, 10 location-unknown sensors and an incremental number of additional location-known sensors acting as colluders. For random deployment, the curve in Figure 8 was computed by averaging the exact number of neighbours per location-unknown node in each of the 100 runs per simulation scenario (i.e., ten scenarios, from 10% to 90% colluders).
As a function of the number of active neighbours per location-unknown node, we compare the cost of executing algorithms SCC and CC. Figure 9 shows the average cost per algorithm, plus the 95% confidence intervals. The cost is determined by the amount of exchanges that a location-unknown node needs to handle. The description of Algorithms 1 and 2 shows that such cost mainly depends on the number of active neighbours; that is, the cost is bounded by the number of processed replies (cf. Lines 2 and 8 of Algorithm 1 for SCC; and Lines 2 and 7 of Algorithm 2 for CC). We can see that the number of processed replies in the SCC algorithm is always slightly higher than the equivalent number of processed replies in the CC algorithm. This leads to the conclusion that the cost of SCC is always higher than the cost of CC. The experimental results depicted in Figure 9 show that the increase is generally reasonable.

7. Conclusions

The deployment of a wireless sensor network (WSN) under hostile environments may lead to vulnerable scenarios. In particular, many distinct attacks corrupt the estimation of positions, which, in turn, can have a significant negative impact on the behaviour of software relying on such estimations. Consequently, much work has focused on how to correctly compute the latter in the presence of different kinds of attacks. However, how to deal with colluders has not received much attention. To remedy this, here we have focussed on three kinds of such attackers that target the localization process. Most importantly, these attackers are taken to be able to alter the information transmitted between the nodes of the WSN. We described at length a decentralized algorithm that established the coordinates of location-unknown nodes in the presence of such adversaries. Our solution also supports the detection of colluders within the communication range of this sensor. Through extensive simulations we validated two different environments: uniform deployments and random distribution of nodes. With regard to previous work, our new algorithm achieves a higher performance in terms of collusion detection, and at a reasonable cost increase.

Acknowledgments

The authors gratefully acknowledge financial support from the Natural Sciences and Engineering Research Council of Canada (NSERC) under Grants No. RGPIN-2015-05390.

Author Contributions

Wei Shi is the main contributor to this research having created both the algorithm presented here and the original draft of this paper. Michel Barbeau and Jean-Pierre Corriveau have contributed to the editing and improvement of the latter. Joaquin Garcia Alfaro and Meng Yao have developed and written up all the material pertaining to the simulations.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rashid, B.; Rehmani, M. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  2. Livinsa, Z.; Jayashri, S. Moving target localizaion in WSNs. J. Theor. Appl. Inf. Technol. 2015, 81, 529–534. [Google Scholar]
  3. Guerrero-Higueras, A.; DeCastro-Garca, N.; Rodriguez-Lera, F.; Matellan, V. Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. Comput. Secur. 2017, 70, 422–435. [Google Scholar] [CrossRef]
  4. Chen, H.; Lou, W.; Wang, Z.; Wu, J.; Wang, Z.; Xia, A. Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive Mob. Comput. 2015, 16, 22–35. [Google Scholar] [CrossRef]
  5. Chowdhury, T.J.S.; Elkin, C.; Devabhaktuni, V.; Rawat, D.B.; Oluoch, J. Advances on localization techniques for wireless sensor networks: A survey. Comput. Netw. 2016, 110, 284–305. [Google Scholar] [CrossRef]
  6. Oracevic, L.; Akbas, S.; Ozdemir, S. Secure and reliable object tracking in wireless sensor networks. Comput. Secur. 2017, 70, 307–318. [Google Scholar] [CrossRef]
  7. Lyu, C.; Gu, D.; Zhang, X.; Sun, S.; Zhang, Y.; Pande, A. SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 2015, 59, 37–51. [Google Scholar] [CrossRef]
  8. Kumar, V.; Kumar, S. Energy balanced position-based routing for lifetime maximization of wireless sensor networks. Ad Hoc Netw. 2016, 52, 117–129. [Google Scholar] [CrossRef]
  9. Zadin, A.; Fevens, F. Neighborhood-based interference minimization for stable position-based routing in mobile ad hoc networks. Future Gener. Comput. Syst. 2016, 64, 88–97. [Google Scholar] [CrossRef]
  10. Pathak, G.R.; Patil, S.H. Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks. Procedia Comput. Sci. 2016, 78, 579–586. [Google Scholar] [CrossRef]
  11. Esposito, C.; Choi, C. Signaling game based strategy for secure positioning in wireless sensor networks. Pervasive Mob. Comput. 2017. In Press. [Google Scholar] [CrossRef]
  12. Douceur, J. The sybil attack. In Proceedings of the International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 7–8 March 2002; pp. 251–260. [Google Scholar]
  13. Eriksson, J.; Krishnamurthy, S.; Faloutsos, M.T.A. Practical countermeasure to the wormhole attack in wireless networks. In Proceedings of the IEEE International Conference on Network Protocols, Kyoto, Japan, 5–8 October 2010; pp. 75–84. [Google Scholar]
  14. Capkun, S.; Rasmussen, K.; Cagalj, M.; Srivastava, M. Secure localization with hidden and mobile base stations. IEEE Trans. Mob. Comput. 2008, 7, 470–483. [Google Scholar] [CrossRef]
  15. Liu, D.G.; Ning, P.; Du, W.L. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS), Columbus, OH, USA, 6–10 June 2005; pp. 609–691. [Google Scholar]
  16. Shi, W.; Barbeau, M.; Garcia-Alfaro, J.; Corriveau, J.P. Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Netw. 2013, 17, 87–102. [Google Scholar]
  17. Srinivasan, A.; Wu, J.; Teitelbaum, J. Distributed reputation-based secure localization in sensor networks. J. Auton. Trust. Comput. 2008, 3, 1–13. [Google Scholar]
  18. Wang, X.; Qian, L.; Jian, H. Tolerant majority colluding attacks for secure localization in wireless sensor networks. In Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, 24–26 September 2009; pp. 1–5. [Google Scholar]
  19. Shi, W.; Corriveau, J.P.; Yao, M. Resilient secure localization and detection of colluding attackers in WSNs. In Ad-hoc, Mobile, and Wireless Networks (AdhocNOW); Springer: Berlin, Germany, 2012; pp. 181–192. [Google Scholar]
  20. Luo, G.; Han, Z.; Lu, L.; Hussain, M.J. Real-time and passive wormhole detection for wireless sensor networks. In Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, 16–19 December 2014; pp. 592–599. [Google Scholar]
  21. Savvides, A.; Han, C.; Strivastava, M.B. Dynamic fine-grained localization in Ad-Hoc networks of sensors. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, 16–21 July 2001; pp. 166–179. [Google Scholar]
  22. Rezvani, M.; Ignjatovic, A.; Bertino, E.; Jha, S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secur. Comput. 2015, 12, 98–110. [Google Scholar] [CrossRef]
  23. Adnan, A.I.; Hanapi, Z.M.; Othman, M.; Zukarnain, Z.A.A. Secure region-based geographic routing protocol (SRBGR) for wireless sensor networks. PLoS ONE 2017, 12. [Google Scholar] [CrossRef] [PubMed]
  24. Meadows, C.; Poovendran, R.; Pavlovic, D.; Chang, L.; Syverson, P. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks; Springer Science + Business Media: New York, NY, USA, 2007; pp. 279–298. [Google Scholar]
  25. Jadliwala, M.; Zhong, S.; Upadhyaya, S.; Qiao, C.; Hubaux, J.P. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. IEEE Trans. Mob. Comput. 2010, 9, 810–823. [Google Scholar] [CrossRef]
  26. Lazos, L.; Poovendran, R.; Capkun, S. ROPE: Robust position estimation in wireless sensor networks. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, USA, 24–27 April 2005; pp. 324–331. [Google Scholar]
  27. Garcia-Alfaro, J.; Barbeau, M.; Kranakis, E. Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In Proceedings of the 7th Annual Communication Networks and Services Research (CNSR) Conference, Moncton, NB, Canada, 11–13 May 2009; pp. 86–93. [Google Scholar]
  28. Garcia-Alfaro, J.; Barbeau, M.; Kranakis, E. Positioning of Wireless Sensor Nodes in the Presence of Liars; Technical Report, tr-10-04; School of Computer Science, Carleton University: Ottawa, ON, Canada, 2010. [Google Scholar]
  29. Garcia-Alfaro, J.; Barbeau, M.; Kranakis, E. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. Ann. Telecommun. 2011, 66, 535–552. [Google Scholar] [CrossRef]
  30. Niculescu, D.; Nath, B. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference, San Antonio, TX, USA, 25–29 November 2001; pp. 2926–2931. [Google Scholar]
  31. Jiang, J.; Han, G.; Shu, L.; Chao, H.; Nishio, S. A novel secure localization scheme against collaborative collusion in wireless sensor networks. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey, 4–8 July 2011; pp. 308–313. [Google Scholar]
  32. Du, Q.; Qian, Z.; Jiang, H.; Wang, S. Localization of anchor nodes for wireless sensor networks. In Proceedings of the New Technologies, Mobility and Security (NTMS), Tangier, Morocco, 5–7 November 2008; pp. 1–5. [Google Scholar]
  33. Tian, S.; Zhang, X.; Wang, X.; Sun, P.; Zhang, H.A. Selective Anchor Node Localization Algorithm for Wireless Sensor Networks. In Proceedings of the International Conference on Convergence Information Technology, Gyeongju, Korea, 21–23 November 2007; pp. 358–362. [Google Scholar]
  34. Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the First International Conference on Simulation Tools and Techniques for Communications Networks and Systems and Workshops (Simutools), Marseille, France, 3–7 March 2008; pp. 1–60. [Google Scholar]
Figure 1. Communication range scenarios of two sensors nodes A and B. (a) Both A and B are inside the communication range of each other. (b) Both A and B are out of the communication range of each other. (c) A is in the communication range of B, but B is out of the communication range of A.
Figure 1. Communication range scenarios of two sensors nodes A and B. (a) Both A and B are inside the communication range of each other. (b) Both A and B are out of the communication range of each other. (c) A is in the communication range of B, but B is out of the communication range of A.
Sensors 17 01892 g001
Figure 2. Detailed example: (a) In this example, sensor A has four neighbours, i.e., K contains B 1 , B 2 , B 3 and B 4 . For i = 1 , 2 , 3 , 4 , sensor A (1) requests and gets the location ( x i , y i ) of every neighbour B i ; and (2) derives each self-to-neighbour B i distance. (b) Using the location of every neighbour B i and distance ( d ( B i , A ) ), a disc is calculated ( d B i ). Here this is shown for neighbour B 1 . (c) For each possible triplet t over the set of discs obtained in (b), calculate the intersection point ( x t , y t ) of this triplet of discs. This is shown here for t equal to { B 2 , B 3 , B 4 } . In this example, there are four possible combinations of three, that is, four triplets. Assuming here that all neighbours are truth-tellers and mutually within communication range, they will be all in agreement (up to this point: Lines 1 to 4 of Algorithm 1). The CCL of A contains B 1 , B 2 , B 3 and B 4 , and their coordinates (Lines 6 to 8 of Algorithm 1). The CCLs obtained from neighbours are all consistent (Lines 9 to 11 of Algorithm 1). Each neighbour is consistently listed in three CCLs of neighbours. For example, B 1 is listed in the CCLs of B 2 , B 3 and B 4 , with the same coordinates. Each neighbour gets a score of 3 (Lines 12 to 18 of Algorithm 1). Consequently, each neighbour is labelled truth-teller (Lines 19 to 25 of Algorithm 1).
Figure 2. Detailed example: (a) In this example, sensor A has four neighbours, i.e., K contains B 1 , B 2 , B 3 and B 4 . For i = 1 , 2 , 3 , 4 , sensor A (1) requests and gets the location ( x i , y i ) of every neighbour B i ; and (2) derives each self-to-neighbour B i distance. (b) Using the location of every neighbour B i and distance ( d ( B i , A ) ), a disc is calculated ( d B i ). Here this is shown for neighbour B 1 . (c) For each possible triplet t over the set of discs obtained in (b), calculate the intersection point ( x t , y t ) of this triplet of discs. This is shown here for t equal to { B 2 , B 3 , B 4 } . In this example, there are four possible combinations of three, that is, four triplets. Assuming here that all neighbours are truth-tellers and mutually within communication range, they will be all in agreement (up to this point: Lines 1 to 4 of Algorithm 1). The CCL of A contains B 1 , B 2 , B 3 and B 4 , and their coordinates (Lines 6 to 8 of Algorithm 1). The CCLs obtained from neighbours are all consistent (Lines 9 to 11 of Algorithm 1). Each neighbour is consistently listed in three CCLs of neighbours. For example, B 1 is listed in the CCLs of B 2 , B 3 and B 4 , with the same coordinates. Each neighbour gets a score of 3 (Lines 12 to 18 of Algorithm 1). Consequently, each neighbour is labelled truth-teller (Lines 19 to 25 of Algorithm 1).
Sensors 17 01892 g002
Figure 3. Let A i be an evil-ring attacker and A i be its fake location. Any sensor on the line that is perpendicular to A i A i and passing through A i A i ’s midpoint cannot detect A i as an evil-ring attacker. Given no three sensors are collinear (by assumption), there is no other location-unknown sensor other than U i and U j that can be fooled by A i .
Figure 3. Let A i be an evil-ring attacker and A i be its fake location. Any sensor on the line that is perpendicular to A i A i and passing through A i A i ’s midpoint cannot detect A i as an evil-ring attacker. Given no three sensors are collinear (by assumption), there is no other location-unknown sensor other than U i and U j that can be fooled by A i .
Sensors 17 01892 g003
Figure 4. Uniform deployment.
Figure 4. Uniform deployment.
Sensors 17 01892 g004
Figure 5. Comparative representation of the successful detection rate with regard to the super cross-check (SCC) algorithm and the cross-check (CC) algorithm. Advantage represents the difference between the success rate of the SCC and CC algorithm results. (a) Uniform deployment; (b) Random deployment. WSN: wireless sensor network.
Figure 5. Comparative representation of the successful detection rate with regard to the super cross-check (SCC) algorithm and the cross-check (CC) algorithm. Advantage represents the difference between the success rate of the SCC and CC algorithm results. (a) Uniform deployment; (b) Random deployment. WSN: wireless sensor network.
Sensors 17 01892 g005
Figure 6. Comparison of colluder detection failures in the uniformly deployed WSN simulations. Failure type 1 refers to a final CC list that is empty. Failure type 2 refers to a non-empty final CC list containing, at least, one attacker. Failure type 3 means a non-empty final CC list containing exactly one attacker. (a) CC algorithm; (b) super cross-check algorithm.
Figure 6. Comparison of colluder detection failures in the uniformly deployed WSN simulations. Failure type 1 refers to a final CC list that is empty. Failure type 2 refers to a non-empty final CC list containing, at least, one attacker. Failure type 3 means a non-empty final CC list containing exactly one attacker. (a) CC algorithm; (b) super cross-check algorithm.
Sensors 17 01892 g006
Figure 7. Random deployment.
Figure 7. Random deployment.
Sensors 17 01892 g007
Figure 8. Average number of neighbours per location-unknown node and its 95% confidence intervals.
Figure 8. Average number of neighbours per location-unknown node and its 95% confidence intervals.
Sensors 17 01892 g008
Figure 9. Average cost per algorithm and its 95% confidence intervals. (a) Uniform deployment; (b) Random deployment.
Figure 9. Average cost per algorithm and its 95% confidence intervals. (a) Uniform deployment; (b) Random deployment.
Sensors 17 01892 g009

Share and Cite

MDPI and ACS Style

Shi, W.; Barbeau, M.; Corriveau, J.-P.; Garcia-Alfaro, J.; Yao, M. Secure Localization in the Presence of Colluders in WSNs. Sensors 2017, 17, 1892. https://doi.org/10.3390/s17081892

AMA Style

Shi W, Barbeau M, Corriveau J-P, Garcia-Alfaro J, Yao M. Secure Localization in the Presence of Colluders in WSNs. Sensors. 2017; 17(8):1892. https://doi.org/10.3390/s17081892

Chicago/Turabian Style

Shi, Wei, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, and Meng Yao. 2017. "Secure Localization in the Presence of Colluders in WSNs" Sensors 17, no. 8: 1892. https://doi.org/10.3390/s17081892

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop