Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks

With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to information resources. In this work, a statistic location verification algorithm in randomly deployed sensor networks is proposed. The nodes in the networks are classified to three roles. The claimer broadcasts the position message. The witnesses rebroadcast it and report the distance and lowest hop information to the verifier. The verifier makes use of hypothesis tests to make a decision. At last the simulation results confirm the validation of the algorithm.

[1]  Tarek F. Abdelzaher,et al.  Range-free localization and its impact on large scale sensor networks , 2005, TECS.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[4]  Wei,et al.  Power Consumption Model in Two-tiered Wireless Sensor Networks , 2006 .

[5]  Eylem Ekici,et al.  Analysis of hop-distance relationship in spatially random sensor networks , 2005, MobiHoc '05.

[6]  Brian D. Noble,et al.  Zero-interaction authentication , 2002, MobiCom '02.

[7]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[9]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[10]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[12]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[13]  Eylem Ekici,et al.  A Probabilistic Approach to Location Verification in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.