EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES

Kaiqi Xiong, David Thuente

2008

Abstract

The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. It is impractical to have a GPS device on each sensor in WSN due to costs. Most of the existing location discovery schemes can only be used in the trusted environment. Recent research has addressed security issues in sensor network localization but, to the best of our knowledge, none has completely solved the secure localization problem. In this paper, we propose novel schemes for secure dynamic localization in sensor networks. The proposed algorithms tolerate up to 50% of beacon nodes being malicious and they have linear computation time with respect to the number of reference nodes. We have conducted simulations to analyze their performance.

References

  1. Bahl, P. and Padmanabhan, V. (2000). An in-building RFbased user location and tracking system. In Proceedings of the IEEE INFOCOM 7800.
  2. Bernholt, T. and Fried, R. (2003). Computing the update of the repeated median regression line in linear time. Information Processing Letters, (88):111-117.
  3. Bulusu, N., Heidemann, J., and Estrin, D. (2004). GPS-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7(5):28- 34.
  4. Doherty, L., Pister, K., and Ghaoui, L. (2001). Convex optimization methods for sensor node position estimation. In Proceedings of INFOCOM 7801.
  5. Fretzagias, C. and Papadopouli, M. (2004). Cooperative location-sensing for wireless networks. In Proceedings of IEEE PerCom 7804.
  6. He, T., Huang, C., Blum, B. M., Stankovic, J., and Abdelzaher, T. (2003). Range-free localization schemes for large scale sensor networks. In MobiCom 7803.
  7. Hu, L. and Evans, D. (2004). Localization for mobile sensor networks. In MobiCom 7804.
  8. Huber, P. J. (1981). Robust statistics. Addison-Wesley Publishing Company, New York.
  9. Karp, B. and Kung, H. (2003). Greedy perimeter stateless routing. In MobiCom'03.
  10. Liu, D., Ning, P., and Du, W. (2005a). Attack-resistant location estimation in sensor networks. In Proceedings of IPSN 7805.
  11. Liu, D., Ning, P., and Du, W. (2005b). Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of IPSN 7805.
  12. Mainnwaring, A., Polastre, J., Szewczyk, R., Culler, D., and Anderson, J. (2002). Wireless sensor network for habitat monitoring. In Proceedings of ACM WSNA'02.
  13. Mauve, M., Widmer, J., and hartenstein, H. (2001). A survey on position-based routing in mobile Ad-Hoc networks. IEEE Network Magazine.
  14. Niculescu, D. and Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM 7801.
  15. Priyantha, N., Chakraborty, A., and Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of MOBICOM 7800.
  16. Want, R., Hopper, A., Falcao, V., and Gibbons, J. (1992). The active badge location systems. ACM Transactions on Information Systems.
  17. Wellenhoff, H., Lichtenegger, H., and Collins, J. (1997). Global Positions System: Theory and Practice, Fourth Edition. Springer Verlag.
Download


Paper Citation


in Harvard Style

Xiong K. and Thuente D. (2008). EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 190-196. DOI: 10.5220/0001927501900196


in Bibtex Style

@conference{secrypt08,
author={Kaiqi Xiong and David Thuente},
title={EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={190-196},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001927501900196},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES
SN - 978-989-8111-59-3
AU - Xiong K.
AU - Thuente D.
PY - 2008
SP - 190
EP - 196
DO - 10.5220/0001927501900196