Secure localization with attack detection in wireless sensor networks
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1372 http://dx.doi.org/10.1007/s10207-011-0127-4 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2372 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-23722011-08-08T09:24:05Z Secure localization with attack detection in wireless sensor networks ZHU, Wentao Xiang, Yang Zhou, Jianying DENG, Robert H. Feng, Bao 2011-06-01T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/1372 info:doi/10.1007/s10207-011-0127-4 http://dx.doi.org/10.1007/s10207-011-0127-4 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known apriori. We address the problem of localizing the regular nodes with range-based location references obtained from certain anchor nodes referred to as beacons particularly in an adverse environment where some of the beacons may be compromised. We propose an innovative modular solution featuring two lightweight modules that are for dedicated functionalities respectively but can also be closely integrated. First we harness simple geometric triangular rules and an efficient voting technique to enable the attack detection module which identifies and filters out malicious location references. We then develop a secure localization module that computes and clusters certain reference points and the position of the concerned regular node is estimated with the centroid of the most valuable reference points identified. Extensive simulations show that our attack detection module can detect compromised beacons effectively and the secure localization module can subsequently provide a dependable localization service in terms of bounded estimation error. The integrated system turns out to be tolerant of malicious attacks even in highly challenging scenarios Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known apriori. We address the problem of localizing the regular nodes with range-based location references obtained from certain anchor nodes referred to as beacons particularly in an adverse environment where some of the beacons may be compromised. We propose an innovative modular solution featuring two lightweight modules that are for dedicated functionalities respectively but can also be closely integrated. First we harness simple geometric triangular rules and an efficient voting technique to enable the attack detection module which identifies and filters out malicious location references. We then develop a secure localization module that computes and clusters certain reference points and the position of the concerned regular node is estimated with the centroid of the most valuable reference points identified. Extensive simulations show that our attack detection module can detect compromised beacons effectively and the secure localization module can subsequently provide a dependable localization service in terms of bounded estimation error. The integrated system turns out to be tolerant of malicious attacks even in highly challenging scenarios Information Security |
spellingShingle |
Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known apriori. We address the problem of localizing the regular nodes with range-based location references obtained from certain anchor nodes referred to as beacons particularly in an adverse environment where some of the beacons may be compromised. We propose an innovative modular solution featuring two lightweight modules that are for dedicated functionalities respectively but can also be closely integrated. First we harness simple geometric triangular rules and an efficient voting technique to enable the attack detection module which identifies and filters out malicious location references. We then develop a secure localization module that computes and clusters certain reference points and the position of the concerned regular node is estimated with the centroid of the most valuable reference points identified. Extensive simulations show that our attack detection module can detect compromised beacons effectively and the secure localization module can subsequently provide a dependable localization service in terms of bounded estimation error. The integrated system turns out to be tolerant of malicious attacks even in highly challenging scenarios Information Security ZHU, Wentao Xiang, Yang Zhou, Jianying DENG, Robert H. Feng, Bao Secure localization with attack detection in wireless sensor networks |
format |
text |
author |
ZHU, Wentao Xiang, Yang Zhou, Jianying DENG, Robert H. Feng, Bao |
author_facet |
ZHU, Wentao Xiang, Yang Zhou, Jianying DENG, Robert H. Feng, Bao |
author_sort |
ZHU, Wentao |
title |
Secure localization with attack detection in wireless sensor networks |
title_short |
Secure localization with attack detection in wireless sensor networks |
title_full |
Secure localization with attack detection in wireless sensor networks |
title_fullStr |
Secure localization with attack detection in wireless sensor networks |
title_full_unstemmed |
Secure localization with attack detection in wireless sensor networks |
title_sort |
secure localization with attack detection in wireless sensor networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1372 http://dx.doi.org/10.1007/s10207-011-0127-4 |
_version_ |
1770571061583151104 |