Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks

For location-aware applications in wireless sensor networks (WSNs), it is important to ensure that sensor nodes can get correct locations in a hostile WSNs. Sybil attacks, which are vital threats in WSNs, especially in the distributed WSNs. They can forge one or multiple identities to decrease the localization accuracy, or sometimes to collapse the whole localization systems. In this paper, a novel lightweight sybil-free (SF)-APIT algorithm is presented to solve the problem of sybil attacks in APIT localization scheme, which is a popular range-free method and performs at individual node in a purely distributed fashion. The proposed SF-APIT scheme requires minimal overhead for wireless devices and works well based on the received signal strength. Simulations demonstrate that SF-APIT is an effective scheme in detecting and defending against sybil attacks with a high detection rate in distributed wireless localization schemes.

[1]  Mo Wei,et al.  AOA based trust evaluation scheme for Sybil attack detection in WSN , 2010 .

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[4]  Jia Li,et al.  An Improved APIT Location Algorithm for Wireless Sensor Networks , 2012 .

[5]  Shirshu Varma,et al.  Distance measurement and error estimation scheme for RSSI based localization in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Wireless Communication and Sensor Networks (WCSN).

[6]  Srdjan Capkun,et al.  Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[8]  Ling Li,et al.  Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks , 2014, IEEE Systems Journal.

[9]  Haiqing Jiang,et al.  Tolerant Majority-Colluding Attacks for Secure Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Ling Li,et al.  Local Semidefinite Programming-Based Node Localization System for Wireless Sensor Network Applications , 2014, IEEE Systems Journal.

[11]  Hongxu Jin,et al.  Improvement on APIT Localization Algorithms for Wireless Sensor Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[12]  Gianluca Dini,et al.  Drone Path Planning for Secure Positioning and Secure Position Verification , 2017, IEEE Transactions on Mobile Computing.

[13]  Zhe Wang,et al.  VN-APIT: virtual nodes-based range-free APIT localization scheme for WSN , 2016, Wirel. Networks.

[14]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[15]  Mei-Po Kwan,et al.  Location-based service using ontology-based semantic queries: A study with a focus on indoor activities in a university context , 2017, Comput. Environ. Urban Syst..

[16]  Xiangliang Zhang,et al.  CAF: Cluster Algorithm and A-Star with Fuzzy Approach for Lifetime Enhancement in Wireless Sensor Networks , 2014 .

[17]  Tian He,et al.  Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.

[18]  Kang G. Shin,et al.  Attack-tolerant localization via iterative verification of locations in sensor networks , 2008, TECS.

[19]  Richard P. Martin,et al.  The limits of localization using signal strength: a comparative study , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[20]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[21]  Gianluca Dini,et al.  Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection , 2016, ACM Trans. Sens. Networks.

[22]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[23]  Lei Yu,et al.  Characterizing data deliverability of greedy routing in wireless sensor networks , 2015, SECON.

[24]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[25]  Tian He,et al.  Differentiated surveillance for sensor networks , 2003, SenSys '03.

[26]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[27]  Yuan Yali,et al.  Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks , 2016 .

[28]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).