Secure Node Localization in Mobile Sensor Networks

Secure node localization in wireless sensor networks WSN has become an important research topic. Although, Global Positioning System GPS based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based BB and Without Beacon based WBB. The BB approach has been studied extensively under adversarial model and many algorithms based on BB approach have been proposed in literature in order to localize nodes in a secure manner. In contrast, WBB approach for node localization under adversarial model has not received substantial attention from researchers. In this paper, the authors discuss WBB approach for node localization under adversarial model. The authors discuss static and dynamic key settings for node localization using WBB approach. The authors present an improved protocol for node localization in mobile sensor networks, aiming at minimizing the impact of node capture threats. The authors consider the LEAP Localized Encryption and Authentication Protocol Zhu, Setia, & Jajodia, 2003 and the LOCK Localized Combinatorial Keying Eltoweissy, Moharrum, & Mukkamala, 2006 as the building blocks of their proposed scheme. The authors show that the improved protocol provides effective node localization in a secure manner with minimal node capture threats.

[1]  Srdjan Capkun,et al.  SecNav: secure broadcast localization and time synchronization in wireless networks , 2007, MobiCom '07.

[2]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[3]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Jan M. Rabaey,et al.  Location in distributed ad-hoc wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Philip T. Kortum,et al.  Evaluating the Usability of Multimedia, Mobile and Network-Based Products , 2012, Int. J. Wirel. Networks Broadband Technol..

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[8]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[10]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[12]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[13]  John A. Stankovic,et al.  Practical and secure localization and key distribution for wireless sensor networks , 2012, Ad Hoc Networks.