A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.

[1]  Rabi N. Mahapatra,et al.  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[2]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[3]  Guangjie Han,et al.  A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks , 2016, Sensors.

[4]  Miodrag Potkonjak,et al.  Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure , 2001, MobiHoc '01.

[5]  Li Xiao,et al.  Sensor localization in concave environments , 2008, TOSN.

[6]  Avinash Srinivasan SecLoc - secure localization in WSNs using CDS , 2011, Secur. Commun. Networks.

[7]  Bo Yu,et al.  Security Analysis on Node Localization Systems of Wireless Sensor Networks: Security Analysis on Node Localization Systems of Wireless Sensor Networks , 2010 .

[8]  Qiang Zhang,et al.  A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[9]  Gaurav S. Sukhatme,et al.  On the Feasibility of Ad-Hoc Localization Systems , 2003 .

[10]  Hongyi Wu,et al.  Localization in Wireless Ad Hoc Networks , 2005 .

[11]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[12]  Magdy A. Bayoumi,et al.  Secure localization for wireless sensor networks using decentralized dynamic key generation , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[14]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[16]  Samiran Chattopadhyay,et al.  Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network , 2016, J. Comput. Networks Commun..

[17]  Jingsha He,et al.  A Signcryption-based Secure Localization Scheme in Wireless Sensor Networks , 2012 .

[18]  Srdjan Capkun,et al.  Location privacy of distance bounding protocols , 2008, CCS.

[19]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[20]  Jie Wu,et al.  A Survey on Secure Localization in Wireless Sensor Networks , 2007 .

[21]  Azzedine Boukerche,et al.  Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems , 2008, Comput. Commun..

[22]  Robert H. Deng,et al.  Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.

[23]  Jie Yang,et al.  Protecting Multi-Lateral Localization Privacy in Pervasive Environments , 2015, IEEE/ACM Transactions on Networking.

[24]  B. R. Badrinath,et al.  Localized positioning in ad hoc networks , 2003, Ad Hoc Networks.

[25]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[26]  Guangjie Han,et al.  Secure Localization in Wireless Sensor Networks: A Survey (Invited Paper) , 2011, J. Commun..

[27]  Aihua Xia,et al.  Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..

[28]  John A. Stankovic,et al.  Practical and secure localization and key distribution for wireless sensor networks , 2012, Ad Hoc Networks.

[29]  Prathima Agrawal,et al.  Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[30]  Chin-Chen Chang,et al.  A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[31]  Rui Yang,et al.  An Efficient Secure DV-Hop Localization for Wireless Sensor Network , 2015 .

[32]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[33]  Gulshan Kumar,et al.  An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs , 2017, J. Netw. Comput. Appl..

[34]  Alan Dahgwo Yein,et al.  Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution , 2016 .

[35]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[36]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[37]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[38]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[39]  Min Wu,et al.  An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[40]  Chunming Qiao,et al.  Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.

[41]  Krishnendu Chatterjee,et al.  Game theoretic secure localization in wireless sensor networks , 2014, 2014 International Conference on the Internet of Things (IOT).