Tolerant Majority-Colluding Attacks for Secure Localization in Wireless Sensor Networks

To solve the secure localization problems, a number of secure localization schemes have been developed at present. However, most of these techniques cannot survive malicious attacks in hostile environments where a majority of beacons launch colluding attacks. In this paper, we propose a novel localization algorithm called TMCA (tolerate majority-colluding attacks) that is well suited to WSN which is a resource constrained environment. The TMCA is a distributed algorithm based on the cooperation of non-beacon neighbor nodes and consistency of the Minimum Mean Square Error. TMCA is robust against well known attacks on a WSN such as the wormhole attack, the Sybil attack and Replay attack. Even when there are more colluding malicious anchors than benign anchors on a WSN, it can still work well to generate precise localization results. At the same time, it has reasonable and acceptable communication cost and algorithm complexity. Through simulations, we compare the performance of TMCA with other secure localization schemes and show that TMCA has more efficient and resilient performance.

[1]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[2]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[3]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[5]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[6]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  David E. Culler,et al.  System architecture for wireless sensor networks , 2003 .

[8]  Peng Ning,et al.  Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[9]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[10]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..