Subscribe
Issue No.07 - July (2009 vol.20)
pp: 1050-1058
Daojing He , Harbin Institute of Technology Shenzhen Graduate School, Shenzhen
Lin Cui , Harbin Institute of Technology Shenzhen Graduate School, Shenzhen
Hejiao Huang , Harbin Institute of Technology Shenzhen Graduate School, Shenzhen
Maode Ma , Nanyang Technological University, Singapore
ABSTRACT
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
INDEX TERMS
Localization, security, wireless sensor networks.
CITATION
Daojing He, Lin Cui, Hejiao Huang, Maode Ma, "Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 7, pp. 1050-1058, July 2009, doi:10.1109/TPDS.2008.166
REFERENCES
 [1] Y. Zhang, W. Liu, Y. Fang, and D. Wu, “Secure Localization and Authentication in Ultra-Wideband Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 4, pp. 829-835, Apr. 2006. [2] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. ACM MobiCom, 2000. [3] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-Less Low Cost Outdoor Localization for Very Small Devices,” IEEE Personal Comm. Magazine, pp. 28-34, Oct. 2000. [4] A. Savvides, C. Han, and M. Srivastava, “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors,” Proc. ACM MobiCom '01 pp. 166-179, July 2001. [5] L. Doherty, K.S. Pister, and L.E. Ghaoui, “Convex Optimization Methods for Sensor Node Position Estimation,” Proc. IEEE INFOCOM, 2001. [6] A. Nasipuri and K. Li, “A Directionality Based Location Discovery Scheme for Wireless Sensor Networks,” Proc. ACM Int'l WorkshopWireless Sensor Networks and Applications (WSNA '02), Sept. 2002. [7] A. Savvides, H. Park, and M. Srivastava, “The Bits and Flops of the $N\hbox{-}{\rm Hop}$ Multilateration Primitive for Node Localization Problems,” Proc. ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA '02), Sept. 2002. [8] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T.F. Abdelzaher, “Range-Free Localization Schemes in Large Scale Sensor Networks,” Proc. ACM MobiCom, 2003. [9] R. Nagpal, H. Shrobe, and J. Bachrach, “Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network,” Proc. Second Int'l Workshop Information Processing in Sensor Networks (IPSN), 2003. [10] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS) Using AoA,” Proc. IEEE INFOCOM '03, pp. 1734-1743, Apr. 2003. [11] D. Niculescu and B. Nath, “DV Based Positioning in Ad Hoc Network,” J. Telecomm. Systems, 2003. [12] A. Srinivasan and J. Wu, “A Survey on Secure Localization in Wireless Sensor Networks,” Encyclopedia of Wireless and Mobile Comm., CRC Press, Taylor and Francis Group, 2007. [13] A. Boukerche, H.A.B. Oliveira, E.F. Nakamura, and A.A.F. Loureiro, “Secure Localization Algorithms for Wireless Sensor Networks [Security in Mobile Ad Hoc],” IEEE Comm. Magazine, vol. 46, no. 4, pp. 96-101, Apr. 2008. [14] D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Wireless Sensor Networks,” Proc. Fourth Int'l Workshop Information Processing in Sensor Networks (IPSN '05), pp. 99-106, Apr. 2005. [15] Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” Proc. Fourth Int'l Workshop Information Processing in Sensor Networks (IPSN '05), pp. 91-98, Apr. 2005. [16] C. Wang, A. Liu, and P. Ning, “Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks,” Proc. Int'l Conf. Wireless Algorithms, Systems and Applications (WASA '07), pp. 29-37, Aug. 2007. [17] D. Liu, P. Ning, and W. Du, “Detecting Malicious Beacon Nodesfor Secure Location Discovery in Wireless Sensor Networks,” Proc. 25th Int'l Conf. Distributed Computing Systems (ICDCS'05), pp. 609-619, 2005. [18] A. Srinivasan, J. Teitelbaum, and J. Wu, “DRBTS: Distributed Reputation-Based Beacon Trust System,” Proc. Second IEEE Int'l Symp. Dependable, Autonomic and Secure Computing (DASC '06), pp.277-283, 2006. [19] W. Du, L. Fang, and P. Ning, “Lad: Localization Anomaly Detection for Wireless Sensor Networks,” J. Parallel and Distributed Computing, pp. 874-886, 2006. [20] N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” Proc. ACM Workshop Wireless Security (WiSe '03), pp. 1-10, Sept. 2003. [21] L. Lazos and R. Poovendran, “Serloc: Robust Localization for Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 1, no. 1, pp. 73-100, Aug. 2005. [22] S. Capkun and J. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” Proc. IEEE INFOCOM '05, vol. 3, pp. 1917-1928, 2005. [23] L. Lazos, S. Capkun, and R. Poovendran, “Robust Position Estimation in Wireless Sensor Networks,” Proc. Fourth Int'l Workshop Information Processing in Sensor Networks (IPSN '05), pp.324-331, Apr. 2005. [24] A. Savvides, C. Han, and M. Srivastava, “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors,” Proc. ACM MobiCom '01, pp.166-179, July 2001. [25] D. Xu and K.E. Ygard, “Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets,” IEEE Trans. Software Eng., vol. 32, no. 4, pp. 265-278, Apr. 2006. [26] T. Murata, “Petri Nets: Properties, Analysis and Applications,” Proc. IEEE, vol. 77, no. 4, pp. 541-580, 1989.