Skip to main content

Resilient Secure Localization and Detection of Colluding Attackers in WSNs

  • Conference paper
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7363))

Included in the following conference series:

  • 1334 Accesses

Abstract

There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee the correctness of the estimation of the position of a node despite attacks from adversaries. But very little work has investigated how colluding attackers can modify the behavior of known attacks or even create new ones. In this paper, we first present an attack model that allows three types of colluding attackers to threaten the secure localization process and/or the attacker detection process. We then describe a decentralized algorithm that is used to determine the position of a location-unknown sensor U despite the presence of colluding attackers (that can alter any type of information being exchanged in a WSN in order to form an attack jointly). Most importantly, the proposed algorithm allows U to detect such colluding attackers in its sensing range. Our simulation results show that in both a uniformly deployed WSN environment and in a randomly deployed one, our Super Cross Check algorithm can achieve a high success rate for both secure localization and detection of colluding attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: Distance bounding protocols: Authentication logic analysis and collusion attacks. In: Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks. Springer (2007)

    Google Scholar 

  2. Wang, X., Qian, L., Jian, H.: Tolerant majority colluding attacks for secure localization in wireless sensor networks. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–5 (2009)

    Google Scholar 

  3. Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. In: Annals of Telecommunications, pp. 1–18. Springer (2011), doi: 10.1007/s12243-010-0221-z

    Google Scholar 

  4. Niculescu, D., Nath, B.: Ad hoc positioning system (APS). In: The 2001 IEEE Global Telecommunications Conference of the IEEE Communications Society, pp. 2926–2931 (2001)

    Google Scholar 

  5. Shi, W., Barbeau, M., Garcia-Alfaro, J., Corriveau, J.-P.: Detection of the Evil Ring Attack in Wireless Sensor Networks Using Cross Verification. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montreal, Canada, 8 pages (June 2010)

    Google Scholar 

  6. Shi, W., Barbeau, M., Garcia-Alfaro, J., Corriveau, J.-P.: Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Journal of Ad Hoc & Sensor Wireless Networks (to appear, 2012)

    Google Scholar 

  7. Jiang, J., Han, G., Shu, L., Chao, H., Nishio, S.: A novel secure localization scheme against collaborative collusion in wireless sensor networks. In: 7th International Wireless Communications & Mobile Computing Conference, pp. 308–313 (July 2011)

    Google Scholar 

  8. Savvides, A., Han, C., Strivastava, M.B.: Dynamic fine-grained localization in Ad-Hoc networks of sensors. In: 7th Annual International Conference on Mobile Computing and Networking (MobiCom 2001), pp. 166–179. ACM, New York (2001)

    Chapter  Google Scholar 

  9. Liu, D.G., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: 25th Int. Conf. on Distributed Computing Systems (ICDCS), pp. 609–691. IEEE Computer Society Press, Washington (2005)

    Google Scholar 

  10. Srinivasan, A., Wu, J., Teitelbaum, J.: Distributed reputation-based secure localization in sensor networks. Journal of Autonomic and Trusted Computing (2007)

    Google Scholar 

  11. Du, Q., Qian, Z., Jiang, H., Wang, S.: Localization of Anchor Nodes for Wireless Sensor Networks. In: New Technologies, Mobility and Security (NTMS 2008), pp. 1–5 (2008)

    Google Scholar 

  12. Tian, S., Zhang, X., Wang, X., Sun, P., Zhang, H.: A Selective Anchor Node Localization Algorithm for Wireless Sensor Networks. In: International Conference on Convergence Information Technology, pp. 358–362 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, W., Yao, M., Corriveau, JP. (2012). Resilient Secure Localization and Detection of Colluding Attackers in WSNs. In: Li, XY., Papavassiliou, S., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2012. Lecture Notes in Computer Science, vol 7363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31638-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31638-8_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31637-1

  • Online ISBN: 978-3-642-31638-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics