Lightweight Location Verification Algorithms for Wireless Sensor Networks

The knowledge of sensors' locations is crucial information for many applications in Wireless Sensor Networks (WSNs). When sensor nodes are deployed in hostile environments, the localization schemes are vulnerable to various attacks, e.g., wormhole attack, pollution attack, range enlargement/reduction attack, and etc. Therefore, sensors' locations are not trustworthy and need to be verified before they can be used by location-based applications. Previous verification schemes either require group-based deployment knowledge of the sensor field, or depend on expensive or dedicated hardware, thus they cannot be used for low-cost sensor networks. In this paper, we propose a lightweight location verification system that performs both “on-spot” and “in-region” location verifications. The on-spot verification intends to verify whether the locations claimed by sensors are far from their true spots beyond a certain distance. We propose two algorithms that detect abnormal locations by exploring the inconsistencies between sensors' claimed locations and their neighborhood observations. The in-region verification verifies whether a sensor is inside an application-specific verification region. Compared to on-spot verification, the in-region verification is tolerable to large errors as long as the locations of sensors don't cause the application to malfunction. We study how to derive the verification region for different applications and design a probabilistic algorithm to compute in-region confidence for each sensor. Experiment results show that our on-spot and in-region algorithms can verify sensors' locations with high detection rate and low false positive rate. They are robust in the presence of malicious attacks that are launched during the verification process. Moreover, compared with previous verification schemes, our algorithms are effective and lightweight because they do not rely on the knowledge of deployment of sensors, and they don't require expensive or dedicated hardware, so our algorithms can be used in any low-cost sensor networks.

[1]  Yong Guan,et al.  Location Verification Algorithms forWireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[2]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[3]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[4]  Radhika Nagpal,et al.  Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network , 2003, IPSN.

[5]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[6]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[7]  B. R. Badrinath,et al.  DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..

[8]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[9]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[11]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[12]  Srdjan Capkun,et al.  Location privacy of distance bounding protocols , 2008, CCS.

[13]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[15]  Yih-Chun Hu,et al.  Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.

[16]  Eylem Ekici,et al.  A Probabilistic Approach to Location Verification in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[17]  Vitaly Shmatikov,et al.  Secure Verification of Location Claims with Simultaneous Distance Modification , 2007, ASIAN.

[18]  NingPeng,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005 .

[19]  Srdjan Capkun,et al.  Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[20]  Moustafa Youssef,et al.  A Taxonomy of Localization Schemes for Wireless Sensor Networks , 2007, ICWN.

[21]  Reza Curtmola,et al.  LINK: Location Verification through Immediate Neighbors Knowledge , 2010, MobiQuitous.

[22]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[23]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[24]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[25]  Tian He,et al.  Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.

[26]  Yong Guan,et al.  A key pre-distribution scheme using deployment knowledge for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[27]  Srdjan Capkun,et al.  ID-Based Secure Distance Bounding and Localization , 2009, ESORICS.

[28]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[29]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[30]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[31]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[32]  Rafail Ostrovsky,et al.  Position-Based Cryptography , 2014, SIAM J. Comput..

[33]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[34]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[35]  David C. Moore,et al.  Robust distributed network localization with noisy range measurements , 2004, SenSys '04.