Skip to main content
Erschienen in: Annals of Telecommunications 9-10/2011

01.10.2011

Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes

verfasst von: Joaquin Garcia-Alfaro, Michel Barbeau, Evangelos Kranakis

Erschienen in: Annals of Telecommunications | Ausgabe 9-10/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Geolocalization of nodes in a wireless sensor network is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring the integrity of the system. We analyze the problem of location-unaware nodes determining their location in the presence of misbehaving neighboring nodes that provide false data during the execution of the process. We divide and present potential misbehaving nodes in four different adversary models, based on their capacities. We provide algorithms that enable the location-unaware nodes to determine their coordinates in the presence of these adversaries. The algorithms always work for a given number of neighbors provided that the number of misbehaving nodes is below a certain threshold, which is determined for each adversary model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We use the standard convention for binomial coefficients that \({s \choose t} = 0\) when s < t.
 
Literatur
1.
Zurück zum Zitat Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 11(6):6–28CrossRef Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 11(6):6–28CrossRef
2.
Zurück zum Zitat Bahl P, Padmanabhan VN, Balachandran A (2000) Enhancements to the RADAR user location and tracking system. Microsoft Research, Technical Report MSR-TR-2000-12, Microsoft, p 13 Bahl P, Padmanabhan VN, Balachandran A (2000) Enhancements to the RADAR user location and tracking system. Microsoft Research, Technical Report MSR-TR-2000-12, Microsoft, p 13
3.
Zurück zum Zitat Barbeau M, Kranakis E, Krizanc D, Morin P (2004) Improving distance based geographic location techniques in sensor networks. In: 3rd international conference on AD-HOC networks & wireless (ADHOC-NOW’04). Lecture notes in computer science, vol 3158. Springer, Berlin, pp 197–210 Barbeau M, Kranakis E, Krizanc D, Morin P (2004) Improving distance based geographic location techniques in sensor networks. In: 3rd international conference on AD-HOC networks & wireless (ADHOC-NOW’04). Lecture notes in computer science, vol 3158. Springer, Berlin, pp 197–210
4.
Zurück zum Zitat Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: 24th annual conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, NJ, pp 1917–1928CrossRef Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: 24th annual conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, NJ, pp 1917–1928CrossRef
5.
Zurück zum Zitat Capkun S, Cagalj M, Srivastava M (2006) Secure localization with hidden and mobile base stations. In: 25th annual conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1–10 Capkun S, Cagalj M, Srivastava M (2006) Secure localization with hidden and mobile base stations. In: 25th annual conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1–10
6.
Zurück zum Zitat Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun 24(2):221–232CrossRef Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun 24(2):221–232CrossRef
7.
Zurück zum Zitat Delaet S, Mandal P, Rokicki M, Tixeuil S (2008) Deterministic secure positioning in wireless sensor networks. In: IEEE international conference on distributed computing in sensor networks (DCOSS). Springer, Berlin, pp 469–477 Delaet S, Mandal P, Rokicki M, Tixeuil S (2008) Deterministic secure positioning in wireless sensor networks. In: IEEE international conference on distributed computing in sensor networks (DCOSS). Springer, Berlin, pp 469–477
8.
Zurück zum Zitat Doherty L, Ghaoui LE (2002) Convex position estimation in wireless sensor networks. In: 20th annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1655–1663 Doherty L, Ghaoui LE (2002) Convex position estimation in wireless sensor networks. In: 20th annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1655–1663
9.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: 1st international workshop on peer-to-peer systems (IPTPS 2002). Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260 Douceur JR (2002) The sybil attack. In: 1st international workshop on peer-to-peer systems (IPTPS 2002). Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260
10.
Zurück zum Zitat Garcia-Alfaro J, Barbeau M, Kranakis E (2009) Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: 7th annual communication networks and services research (CNSR) conference. IEEE, Piscataway, NJ, pp 86–93CrossRef Garcia-Alfaro J, Barbeau M, Kranakis E (2009) Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: 7th annual communication networks and services research (CNSR) conference. IEEE, Piscataway, NJ, pp 86–93CrossRef
11.
Zurück zum Zitat He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: 9th annual international conference on mobile computing and networking. ACM, New York, NY, pp 81–95CrossRef He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: 9th annual international conference on mobile computing and networking. ACM, New York, NY, pp 81–95CrossRef
12.
Zurück zum Zitat Hwang J, He T, Kim Y (2008) Secure localization with phantom node detection. Ad Hoc Networks 6(7):1031–1050CrossRef Hwang J, He T, Kim Y (2008) Secure localization with phantom node detection. Ad Hoc Networks 6(7):1031–1050CrossRef
13.
Zurück zum Zitat Ji X, Zha H (2004) Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. In: 23rd annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 2652–2661 Ji X, Zha H (2004) Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. In: 23rd annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 2652–2661
14.
Zurück zum Zitat Lazos L, Poovendran R (2005) SeRLoc: robust localization for wireless sensor networks. Transactions on Sensor Networks, 1st edn, vol 1. ACM, New York, NY, pp 73–100 Lazos L, Poovendran R (2005) SeRLoc: robust localization for wireless sensor networks. Transactions on Sensor Networks, 1st edn, vol 1. ACM, New York, NY, pp 73–100
15.
Zurück zum Zitat Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: 4th international symposium on information processing in sensor networks. IEEE, Piscataway, NJ, pp 324–331 Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: 4th international symposium on information processing in sensor networks. IEEE, Piscataway, NJ, pp 324–331
16.
Zurück zum Zitat Liu D, Ning P, Liu, Du WK (2005) Detecting malicious Beacon nodes for secure location discovery in wireless sensor networks. In: 25th international conference on distributed computing systems. IEEE, Piscataway, NJ, pp 609–619 Liu D, Ning P, Liu, Du WK (2005) Detecting malicious Beacon nodes for secure location discovery in wireless sensor networks. In: 25th international conference on distributed computing systems. IEEE, Piscataway, NJ, pp 609–619
17.
Zurück zum Zitat Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39MATHCrossRef Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39MATHCrossRef
18.
Zurück zum Zitat Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: 3rd international symposium on information processing in sensor networks. ACM, New York, NY, pp 259–268 Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: 3rd international symposium on information processing in sensor networks. ACM, New York, NY, pp 259–268
19.
Zurück zum Zitat Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In: 6th annual international conference on mobile computing and networking. ACM, New York, NY, pp 32–43CrossRef Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In: 6th annual international conference on mobile computing and networking. ACM, New York, NY, pp 32–43CrossRef
20.
Zurück zum Zitat Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: 2nd workshop on wireless security. ACM, New York, NY, pp 1–10 Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: 2nd workshop on wireless security. ACM, New York, NY, pp 1–10
21.
Zurück zum Zitat Savvides A, Han C, Strivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: 7th annual international conference on mobile computing and networking. ACM, New York, NY, pp 166–179 Savvides A, Han C, Strivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: 7th annual international conference on mobile computing and networking. ACM, New York, NY, pp 166–179
Metadaten
Titel
Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
verfasst von
Joaquin Garcia-Alfaro
Michel Barbeau
Evangelos Kranakis
Publikationsdatum
01.10.2011
Verlag
Springer-Verlag
Erschienen in
Annals of Telecommunications / Ausgabe 9-10/2011
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-010-0221-z

Weitere Artikel der Ausgabe 9-10/2011

Annals of Telecommunications 9-10/2011 Zur Ausgabe

Neuer Inhalt