As one of the key technologies in wireless sensor networks (WSN)
localization is the basis of many WSN-based applications. However
WSNs are often deployed in the hostile environment
in which the attackers can eas-ily disrupt the localization procedure of the nodes. The effects of wormhole attack on the DV-Hop localization procedure are analyzed firstly
after which a secure localization scheme against the wormhole attack is proposed. The simulation re-sults illustrate that the proposed secure localization scheme can efficiently reduce the effects of the wormhole attack on the DV-Hop localization
which validates the effectiveness of the proposed scheme.
关键词
Keywords
references
AKYILDIZ I , SU W , SANKARASUBRAMANIAM Y , et al . A survey on sensor networks [J ] . IEEE Communications Magazine , 2002 , 40 ( 8 ): 102 - 114 .
CHEN H , LI H , WANG Z . Research on TDoA-based secure localiza-tion for wireless sensor networks [J ] . Journal on Communications , 2008 , 29 ( 8 ): 11 - 21 .
SIT T , LIU Z , ANG M , SEAH W . Multi-robot mobility enhanced hop-count based localization in ad-hoc networks [J ] . Robotics and Autonomous Systems , 2007 , 55 ( 3 ): 244 - 252 .
HE T , HUANG C , BLUM B , et al . Range-free localization and its impact on large scale sensor networks [J ] . ACM Transactions on Em-bedded Computing Systems , 2005 , 4 ( 4 ): 877 - 906 .
BSHARA M , ORGUNER U , GUSTAFSSON F , BIESEN L . Finger-printing localization in wireless sensor networks based on re-ceived-signal-strength measurements: a case study on WiMAX Net-works [J ] . IEEE Transactions on Vehicular Technology , 2010 , 59 ( 1 ): 283 - 294 .
BOUKERCHE A , OLIVERIA H A , NAKAMURA E F , et al . Secure localization algorithms for wireless sensor networks [J ] . IEEE Communications Magazine , 2008 , 46 ( 4 ): 96 - 101 .
SRINIVASAN A , TEITELBAUM J , WU J . DRBTS: distributed repu-tation-based beacon trust system [A ] . Proceedings of the IEEE Interna-tional Symposium on Dependable, Autonomic and Secure Computing , 2006 . 277 - 283 .
PIRRETTI M , VIJAYKRISHNAN N , MCMANIEL P , MADAN B . SLAT: Secure Localization with Attack Tolerance [R ] Technical report 2006 .
LIU D , NING P , DU W . Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [A ] . Proceedings of the IEEE ICDCS [C ] . 2005 . 609 - 619 .
ANJUM F , PANDEY S , AGRAWAL P . Secure localization in sensor networks using transmission range variation [A ] . Proceedings of the IEEE MASS [C ] . 2005 . 195 - 203 .
CAPKUN S , RASMUSSEN K B , CAGALJ M , et al . Secure location verification with hidden and mobile base stations [J ] . IEEE Transactions on Mobile Computing , 2008 , 7 ( 4 ): 470 - 483 .
CAPKUN S , HUBAUX J P . Secure positioning in wireless net-works [J ] . IEEE Journal on Selected Areas in Communications , 2006 , 24 ( 2 ): 221 - 232 .
LAZOS L , POOVENDRAN R , CAPKUN S . ROPE: robust position estimation in wireless sensor networks [A ] . Proceedings of the IEEE IPSN [C ] . 2005 . 324 - 331 .
DONG D , LI M , LIU Y , et al . Topological detection on wormholes in wireless ad hoc and sensor networks [J ] . IEEE /ACM Transactions on Networking , 2011 , 19 ( 6 ): 1787 - 1796 .
LAZOS L , POOVENDRAN R . SeRLoc: robust localization for wire-less sensor networks [J ] . ACM Transactions on Sensor Networks , 2005 , 1 ( 1 ): 73 - 100 .
LAZOS L , POOVENDRAN R . HiRLoc: high-resolution robust local-ization for wireless sensor networks [J ] . IEEE Journal on Selected Areas in Communications , 2006 , 24 ( 2 ): 233 - 246 .
WU J , CHEN H , LOU W , et al . Label-based DV-Hop localization against wormhole attacks in wireless sensor networks [A ] . Proceedings of IEEE NAS [C ] . 2010 . 79 - 88 .