Secure localization in wireless sensor networks

Wireless sensor networks have very promising future to many applications. Ensuring that sensor nodes locations are verified and are protected from malicious attacks will enable sensor networks deployment in mission critical applications. Due to the deployment nature, sensor nodes are highly vulnerable to localization attacks where an adversary can capture the nodes, changes its location or replaces it with a malicious node. In this paper we study this problem and present a secure localization scheme where nodes can securely locate themselves and send a message about their location to the neighboring nodes, eventually that message reaches the cluster leader and then to a secure base station. To find the location of nodes, we take advantage of triangulation method and protect the message transmission with a secure triple key management scheme.

[1]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[4]  Albert Y. Zomaya,et al.  A Secure Triple-Key Management Scheme for Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[7]  Prathima Agrawal,et al.  Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[8]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[9]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[10]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[11]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.