A comprehensive investigation of secure location estimation techniques for WSN applications

Globally, a number of schemes have been proposed to address the challenging task of providing secure location estimation of sensor nodes (SNs) in a wireless sensor network (WSN) under adversarial conditions. The aim of this paper is to highlight this research work by analyzing the proposed solutions, highlighting their strengths and weaknesses. This work also provides an insight into the steps leading to the design of a novel optimized secure location estimation scheme. Copyright © 2010 John Wiley & Sons, Ltd.

[1]  Prathima Agrawal,et al.  Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[2]  Tian He,et al.  Detecting Phantom Nodes in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  Paul F. Syverson,et al.  A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.

[5]  A.H. Kemp,et al.  Secure Location Estimation in Large Scale Wireless Sensor Networks , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.

[6]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[7]  A. Plowman,et al.  Application of remote thermal imaging and night vision technology to improve endangered wildlife resource management with minimal animal distress and hazard to humans , 2005 .

[8]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[10]  Tarek F. Abdelzaher,et al.  Range-free localization and its impact on large scale sensor networks , 2005, TECS.

[11]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[12]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[13]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[14]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[15]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[16]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[17]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[18]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[19]  Srdjan Capkun,et al.  Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks , 2007 .

[20]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[21]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[22]  A. Savvides,et al.  Title Dynamic Fine-Grained Localization in Ad-Hoc Wireless Sensor Networks , 2001 .

[23]  Eylem Ekici,et al.  Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.

[24]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[25]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[26]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[27]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.