Secure Localization and Key Distribution in Wireless Sensor Network

Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important task for many applications. The crucial problem in Wireless Sensor Networks (WSNs) is position estimation due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is communicating with authenticated neighbors in a secured manner. The mutual authentication between sensor nodes is of great importance i.e. node should only accept and forward their own precise location messages from authenticated neighbors. When WSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole, Sybil etc,. The attackers may disguise as normal node and attack the unknown nodes to interfere with localization process. They may forge, modify or replay localization information to make the estimated positions incorrect. The objective of this paper is to solve the problem of insecurity in localization of sensor nodes. Hence to provide security to localized coordinates during coordinate exchange security has been provided through Elliptic curve cryptography (ECC) to solve this issue. In this paper common attacks against localization and their security measures for secure transmission of localized coordinates.

[1]  Woo Cheol Chung,et al.  An accurate ultra wideband (UWB) ranging for precision asset location , 2003, IEEE Conference on Ultra Wideband Systems and Technologies, 2003.

[2]  Eylem Ekici,et al.  Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.

[3]  John A. Stankovic,et al.  Practical and secure localization and key distribution for wireless sensor networks , 2012, Ad Hoc Networks.

[4]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[5]  Jie Wu,et al.  A Survey on Secure Localization in Wireless Sensor Networks , 2007 .

[6]  Andreas Willig,et al.  A short survey of wireless sensor networks , 2003 .

[7]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[10]  Srdjan Capkun,et al.  Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  V Prema Tulasi,et al.  Implementing Data Security in Wireless Sensor Network’s through Location Aware Multifunctional Key Management Framework , 2011 .

[12]  K. C. Ho,et al.  An accurate algebraic solution for moving source location using TDOA and FDOA measurements , 2004, IEEE Transactions on Signal Processing.

[13]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[14]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[15]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[16]  F. Ellinger,et al.  Local Positioning for Wireless Sensor Networks , 2007, 2007 IEEE Globecom Workshops.

[17]  Dana H. Brooks,et al.  Closed-form solution for positioning based on angle of arrival measurements , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[18]  M. Ekstrom,et al.  Local positioning for wireless sensors based on Bluetooth/spl trade/ , 2004, Proceedings. 2004 IEEE Radio and Wireless Conference (IEEE Cat. No.04TH8746).

[19]  Robert A. Scholtz,et al.  Ranging in a dense multipath environment using an UWB radio link , 2002, IEEE J. Sel. Areas Commun..

[20]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .