Abstract
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee the correctness of the estimation of the position of a node despite attacks from adversaries. But very little work has investigated how colluding attackers can modify the behavior of known attacks or even create new ones. In this paper, we first present an attack model that allows three types of colluding attackers to threaten the secure localization process and/or the attacker detection process. We then describe a decentralized algorithm that is used to determine the position of a location-unknown sensor U despite the presence of colluding attackers (that can alter any type of information being exchanged in a WSN in order to form an attack jointly). Most importantly, the proposed algorithm allows U to detect such colluding attackers in its sensing range. Our simulation results show that in both a uniformly deployed WSN environment and in a randomly deployed one, our Super Cross Check algorithm can achieve a high success rate for both secure localization and detection of colluding attackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: Distance bounding protocols: Authentication logic analysis and collusion attacks. In: Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks. Springer (2007)
Wang, X., Qian, L., Jian, H.: Tolerant majority colluding attacks for secure localization in wireless sensor networks. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–5 (2009)
Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. In: Annals of Telecommunications, pp. 1–18. Springer (2011), doi: 10.1007/s12243-010-0221-z
Niculescu, D., Nath, B.: Ad hoc positioning system (APS). In: The 2001 IEEE Global Telecommunications Conference of the IEEE Communications Society, pp. 2926–2931 (2001)
Shi, W., Barbeau, M., Garcia-Alfaro, J., Corriveau, J.-P.: Detection of the Evil Ring Attack in Wireless Sensor Networks Using Cross Verification. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montreal, Canada, 8 pages (June 2010)
Shi, W., Barbeau, M., Garcia-Alfaro, J., Corriveau, J.-P.: Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Journal of Ad Hoc & Sensor Wireless Networks (to appear, 2012)
Jiang, J., Han, G., Shu, L., Chao, H., Nishio, S.: A novel secure localization scheme against collaborative collusion in wireless sensor networks. In: 7th International Wireless Communications & Mobile Computing Conference, pp. 308–313 (July 2011)
Savvides, A., Han, C., Strivastava, M.B.: Dynamic fine-grained localization in Ad-Hoc networks of sensors. In: 7th Annual International Conference on Mobile Computing and Networking (MobiCom 2001), pp. 166–179. ACM, New York (2001)
Liu, D.G., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: 25th Int. Conf. on Distributed Computing Systems (ICDCS), pp. 609–691. IEEE Computer Society Press, Washington (2005)
Srinivasan, A., Wu, J., Teitelbaum, J.: Distributed reputation-based secure localization in sensor networks. Journal of Autonomic and Trusted Computing (2007)
Du, Q., Qian, Z., Jiang, H., Wang, S.: Localization of Anchor Nodes for Wireless Sensor Networks. In: New Technologies, Mobility and Security (NTMS 2008), pp. 1–5 (2008)
Tian, S., Zhang, X., Wang, X., Sun, P., Zhang, H.: A Selective Anchor Node Localization Algorithm for Wireless Sensor Networks. In: International Conference on Convergence Information Technology, pp. 358–362 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, W., Yao, M., Corriveau, JP. (2012). Resilient Secure Localization and Detection of Colluding Attackers in WSNs. In: Li, XY., Papavassiliou, S., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2012. Lecture Notes in Computer Science, vol 7363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31638-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-31638-8_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31637-1
Online ISBN: 978-3-642-31638-8
eBook Packages: Computer ScienceComputer Science (R0)