Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks

With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to information resources. In this work, a statistic location verification algorithm in randomly deployed sensor networks is proposed. The nodes in the networks are classified to three roles. The claimer broadcasts the position message. The witnesses rebroadcast it and report the distance and lowest hop information to the verifier. The verifier makes use of hypothesis tests to make a decision. At last the simulation results confirm the validation of the algorithm.

[1]  Deborah Estrin,et al.  The PIM architecture for wide-area multicast routing , 1996, TNET.

[2]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Ben Y. Zhao,et al.  Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination , 2001, NOSSDAV '01.

[4]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[5]  Christophe Diot,et al.  Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..

[6]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[7]  Brian D. Noble,et al.  Zero-interaction authentication , 2002, MobiCom '02.

[8]  Kevin C. Almeroth,et al.  The evolution of multicast: from the MBone to interdomain multicast to Internet2 deployment , 2000, IEEE Netw..

[9]  Tarek F. Abdelzaher,et al.  Range-free localization and its impact on large scale sensor networks , 2005, TECS.

[10]  Peng Ning,et al.  A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.

[11]  Charles L. Seitz,et al.  Myrinet: A Gigabit-per-Second Local Area Network , 1995, IEEE Micro.

[12]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[13]  Samir Khuller,et al.  Construction of an efficient overlay multicast infrastructure for real-time applications , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Jonathan S. Turner,et al.  Routing in overlay multicast networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[15]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[16]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[19]  Marcel Waldvogel,et al.  Dimensioning server access bandwidth and multicast routing in overlay networks , 2001, NOSSDAV '01.

[20]  Eylem Ekici,et al.  A Probabilistic Approach to Location Verification in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[21]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[22]  Wei,et al.  Power Consumption Model in Two-tiered Wireless Sensor Networks , 2006 .

[23]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[24]  Mario Gerla,et al.  A Comparative Study of Multicast Protocols: Top, Bottom, or In the Middle? , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[25]  Dhabaleswar K. Panda,et al.  High performance and reliable NIC-based multicast over Myrinet/GM-2 , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..

[26]  Eylem Ekici,et al.  Analysis of hop-distance relationship in spatially random sensor networks , 2005, MobiHoc '05.

[27]  Steven McCanne,et al.  RMX: reliable multicast for heterogeneous networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).