Abstract
In sensor networks, secure localization—determining sensors' locations in a hostile, untrusted environment—is a challenging, but very important, problem that has not yet been addressed effectively. This paper presents an attack-tolerant localization protocol, called Verification for Iterative Localization (VeIL), under which sensors cooperatively safeguard the localization service. By exploiting the high spatiotemporal correlation existing between adjacent nodes, VeIL realizes (a) adaptive management of a profile for normal localization behavior, and (b) distributed detection of false locations advertised by attackers by comparing them against the profile of normal behavior. Our analysis and simulation results show that VeIL achieves high-level tolerance to many critical attacks, and is computationally feasible on resource-limited sensors.
- Basalaj, W. 2001. Proximity visualization of abstract data. Tech. rep.Google Scholar
- Borriello, G., Liu, A., Offer, T., Palistrant, C., and Sharp, R. 2005. Wireless acoustic location with room-level resolution using ultrasound. In Proceedings of the 3rd Annual Conference on Mobile Systems, Applications and Services (MobiSys'05). ACM, New York. Google Scholar
Digital Library
- Bulusu, N., Heidemann, J., and Estrin, D. 2000. GPS-less low cost outdoor localization for very small devices. IEEE Person. Comm. Mag. 7, 5.Google Scholar
Cross Ref
- Capkun, S. and Hubaux, J.-P. 2004. Secure positioning in sensor networks. Tech. rep. EPFL/IC/200444.Google Scholar
- Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA. Google Scholar
Digital Library
- Costa, J., Patwari, N., and Hero III, A. O. 2005. Achieving high-accuracy distributed localization in sensor networks. In Proceedings of International Conference on Acoustics, Speech, and Signal Precessing (ICASSP'05). IEEE, Los Alamitos, CA.Google Scholar
Cross Ref
- Costa, J., Patwari, N., and Hero III, A. O. 2006. Distributed multidimensional scaling with adaptive weighting for node localization in sensor networks. ACM Trans. Sens. Netwo. 2, 1. Google Scholar
Digital Library
- Crossbow Technology. 2005. MICA, MICA2 motes & sensors. Tech. rep.Google Scholar
- Douceur, J. 2002. The sybil attack. In Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). Springer, Berlin. Google Scholar
Digital Library
- Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). ACM, New York. Google Scholar
Digital Library
- Haykin, S. 1991. Adaptive Filter Theory, 2 Ed. Prentice-Hall, Upper Saddle River, NJ. Google Scholar
Digital Library
- He, T., Huang, C., Blum, B. M., Stankovic, J. A., and Abdelzaher, T. 2003. Range-free localization schemes for large scale sensor networks. In Proceedings of the 9th Annual International Conference on Mobile Commuting and Networking (MobiCom'03). ACM, New York. Google Scholar
Digital Library
- Hu, L. and Evans, D. 2004. Localization for mobile sensor networks. In Proceedings of the 10th International Conference on Mobile Commuting and Networking (MobiCom'04). ACM, New York. Google Scholar
Digital Library
- Jain, R., Puri, A., and Sengupta, R. 2001. Geographical routing using partial information for wireless ad hoc networks. IEEE Person. Comm. 8, 1, 48--57.Google Scholar
Cross Ref
- Ji, X. and Zha, H. 2004. Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04). IEEE, Los Alamitos, CA.Google Scholar
- Lazos, L. and Poovendran, R. 2004. SeRLoc: secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM Workshop Wireless Security (WiSe'04). ACM, New York. Google Scholar
Digital Library
- Li, Z., Trappe, W., Zhang, Y., and Nath, B. 2005. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of 4th International Symposium on Information Processing in Sensor Networks (IPSN'05). ACM, New York. Google Scholar
Digital Library
- Liu, D., Ning, P., and Du, W. 2005. Attack-resistant location estimation in sensor networks. In Proceedings of 4th International Symposium on Information Processing in Sensor Networks (IPSN'05). ACM, New York. Google Scholar
Digital Library
- Mishra, A., Nadkarni, K., and Patcha, A. 2004. Intrusion detection in wireless ad hoc networks. IEEE Wire. Comm. 11, 48--60. Google Scholar
Digital Library
- Nicolescu, D. and Nath, B. 2001. Ad-hoc positioning systems (APS). In Proceedings of the Global Telecommunications Conference (GLOBECOM '01). IEEE, Los Alamitos, CA.Google Scholar
- Park, T. and Shin, K. G. 2005. Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mobile Comput. 4, 3. Google Scholar
Digital Library
- Pathirana, P. N., Bulusu, N., Savkin, A. V., and Jha, S. 2005. Node localization using mobile robots in delay-tolerant sensor networks. IEEE Trans. Mobile Comput. 4, 3. Google Scholar
Digital Library
- Patwari, N., Hero III, A. O., Perkins, M., Correal, N. S., and O'Dea, R. J. 2003. Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 51, 8. Google Scholar
Digital Library
- Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D. 2001. SPINS: security protocol for sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Commuting and Networking (MobiCom'01). ACM, New York. Google Scholar
Digital Library
- Priyantha, N. B., Balakrishnan, H., Demaine, E. D., and Teller, S. 2005. Mobile-assisted localization in wireless sensor networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05). IEEE, Los Alamitos, CA.Google Scholar
- Sastry, N., Shankar, U., and Wagner, D. 2003. Secure verification of location claims. In Proceedings of the 2nd ACM Workshop Wireless Security (WiSe'03). ACM, New York. Google Scholar
Digital Library
- Savarese, C., Rabay, J., and Langendoen, K. 2002. Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In USENIX Annual Technical Conference. USENIX, Berkeley, CA. Google Scholar
Digital Library
- Shang, Y., Ruml, W., Zhang, Y., and Fromherz, M. P. J. 2003. Localization for mere connectivity. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03). ACM, New York. Google Scholar
Digital Library
- Waters, B. R. and Felten, E. W. 2003. Secure, private proofs of location. Tech. rep. Princeton University, TR-667-03.Google Scholar
- Whitehouse, K. and Culler, D. 2002. Calibration as parameter estimation in sensor networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Application. ACM, New York. Google Scholar
Digital Library
- Youssef, M. and Agrawala, A. 2005. The horus WLAN location determination system. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys'05). ACM, New York. Google Scholar
Digital Library
- Zhang, Y. and Lee, W. 2000. Intrusion detection in wireless ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Commuting and Networking (MobiCom'00). ACM, New York.Google Scholar
Digital Library
Index Terms
Attack-tolerant localization via iterative verification of locations in sensor networks
Recommendations
Localization in wireless sensor networks
IPSN '07: Proceedings of the 6th international conference on Information processing in sensor networksA fundamental problem in wireless sensor networks is localization -- the determination of the geographical locations of sensors. Most existing localization algorithms were designed to work well either in networks of static sensors or networks in which ...
Defending Wireless Sensor Networks against Adversarial Localization
MDM '10: Proceedings of the 2010 Eleventh International Conference on Mobile Data ManagementIn this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts to disclose physical locations of sensors in the network. The adversary ...
Attack-Resistant Location Estimation in Wireless Sensor Networks
Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for ...






Comments