The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2014 vol.11)
pp: 72-85
Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
ABSTRACT
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers. Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the 40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the first player employs a number of verifiers to do VM computations and the second player controls a malicious node. The verifiers aim at securely localizing malicious nodes, while malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to game theory, the potentialities of VM are analyzed with the aim of improving the defender's strategy. We found that the best placement for verifiers is an equilateral triangle with edge equal to the power range $(R)$, and maximum deception in the undecided region is approximately $(0.27R)$. Moreover, we characterizedâin terms of the probability of choosing an unknown node to examine furtherâthe strategies of the players.
INDEX TERMS
Games, Monitoring, Robustness, Wireless sensor networks, Electronic mail, Game theory,wireless sensor networks, Game theory, localization games, security
CITATION
Nicola Basilico, Nicola Gatti, Mattia Monga, Sabrina Sicari, "Security Games for Node Localization through Verifiable Multilateration", IEEE Transactions on Dependable and Secure Computing, vol.11, no. 1, pp. 72-85, Jan.-Feb. 2014, doi:10.1109/TDSC.2013.30
REFERENCES
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Wireless Sensor Network," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[2] P. Baronti, P. Pillai, V.W.C. Chook, S. Chessa, A. Gotta, and H. Yim-Fun, "Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and Zigbee Standards," Computer Comm., vol. 30, no. 7, pp. 1655-1695, 2007.
[3] L. Hu and D. Evans, "Localization for Mobile Sensor Networks," Proc. ACM MobiCom, pp. 45-57, 2004.
[4] N. Bulusu, J. Heidemann, and D. Estrin, "GPS-Less Low-Cost Outdoor Localization for Very Small Devices," IEEE Personal Comm., vol. 7, no. 5, pp. 28-34, Oct. 2000.
[5] S. Čapkun, M. Hamdi, and J.-P. Hubaux, "GPS-Free Positioning in Mobile Ad-Hoc Networks," Cluster Computing, vol. 5, no. 2, pp. 157-167, 2002.
[6] J. Chen, K. Yao, and R. Hudson, "Source Localization and Beamforming," IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 30-39, Mar. 2002.
[7] L. Doherty, K. Pister, and L.E. Ghaoui, "Convex Position Estimation in WSNs," Proc. IEEE INFOCOM, pp. 1655-1663, 2001.
[8] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T.F. Abdelzaher, "Range-Free Localization Schemes for Large Scale Sensor Networks," Proc. ACM MobiCom, pp. 81-95, 2003.
[9] D. Niculescu and B. Nath, "Ad Hoc Positioning System (APS)," Proc. IEEE Global Telecomm. Conf. (GlobeCom '01), pp. 2926-2931, 2001.
[10] V. Ramadurai and M. Sichitiu, "Localization in Wireless Sensor Networks: A Probabilistic Approach," Proc. Int'l Conf. Wireless Networks (ICWN '03), pp. 275-281, 2003.
[11] A. Savvides, H. Park, and M.B. Srivastava, "The Bits and Flops of the N-Hop Multilateration Primitive for Node Localization Problems," Proc. First ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA '02), pp. 112-121, 2002.
[12] S. Čapkun and J. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Area Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.
[13] Y. Shoham and K. Leyton-Brown, Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge Univ. Press, 2009.
[14] N. Gatti, M. Monga, and S. Sicari, "Localization Security in Wireless Sensor Networks as a Non-Cooperative Game," Proc. IEEE Int'l Congress Ultra Modern Telecomm. and Control Systems and Workshops (ICUMT '10), pp. 295-300, 2010.
[15] N. Gatti, M. Monga, and S. Sicari, "A Localization Game in Wireless Sensor Networks," Proc. First Int'l Conf. Decision and Game Theory for Security (GAMESEC '10), pp. 168-179, 2010.
[16] S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. Workshop the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT '94), vol. 765, pp. 344-359, 1994.
[17] M. Monga and S. Sicari, "On the Impact of Localization Data in WSNs with Malicious Nodes," SIGSPATIAL, pp. 63-70, 2009.
[18] R. Poovendran, C. Wang, and S. Roy, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Advances in Information Security, Springer-Verlag, 2006.
[19] M. Fewell, "Area of Common Overlap of Three Circles," Australian Maritime Operations Division Defence Science and Technology Organisation, Technical Report DSTO-TN-0722, 2006.
[20] M. Wessendorf, "The On-Line Encyclopedia of Integer Sequences," http://www.research.att.com/njas/sequences A067771, AT&T Labs Research, 2002.
[21] J. von Neumann and O. Morgenstern, Theory of Games and Economic Behavior. Princeton Univ. Press, 1947.
[22] T. Sandholm, A. Gilpin, and V. Conitzer, "Mixed-Integer Programming Methods for Finding Nash Equilibria," Proc. 20th Nat'l Conf. Artificial (AAAI '05), pp. 495-501, 2005.
[23] M. Flood, "The Hide and Seek Game of Von Neumann," Management Science, vol. 18, no. 5, pp. 107-109, 1972.
[24] M. Adler, H. Räcke, N. Sivadasan, C. Sohler, and B. Vöcking, "Randomized Pursuit-Evasion in Graphs," Combinatorics, Probability and Computing, vol. 12, pp. 225-244, 2003.
[25] S. Alpen, "Infiltration Games on Arbitrary Graphs," J. Math. Analysis and Applications, vol. 163, no. 1, pp. 286-288, 1992.
[26] A. Wahsburn and K. Wood, "Two-Person Zero-Sum Games for Network Interdiction," Operational Research, vol. 43, no. 2, pp. 243-251, 1995.
[27] S. Gal, Search Games. Academic Press, 1980.
[28] W. Ruckle, R. Fennel, P. Holmes, and C. Fennemore, "Ambushing Random Walk I," Operational Research, vol. 24, pp. 314-324, 1976.
[29] S. Shen, G. Yue, Q. Cao, and F. Yu, "A Survey of Game Theory in Wireless Sensor Networks Security," J. Networks, vol. 6, no. 3, pp. 521-532, 2011.
[30] A. Agah, S.K. Das, and K. Basu, "A Game Theory Based Approach for Security in WSNs," Proc. IEEE Int'l Conf. Performance, Computing, and Comm. (IPCCC '04), pp. 259-263, 2004.
[31] A. Agah, K. Basu, and S.K. Das, "Preventing DoS Attack in Sensor Networks: A Game Theoretic Approach," Proc. IEEE Int'l Conf. Comm. (ICC '05), pp. 3218-3222, 2005.
[32] A. Agah and S.K. Das, "Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach," Int'l J. Network Security, vol. 5, no. 2, pp. 145-153, 2007.
[33] J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter, "Detection of Denial-of-Message Attacks on Sensor Network Broadcasts," Proc. IEEE Symp. Security and Privacy (SP '05), pp. 64-78, 2005.
[34] Y.B. Reddy, "A Game Theory Approach to Detect Malicious Nodes in WSNs," Proc. IEEE Global Telecomm. Conf. (GlobeCom '09), pp. 259-263, 2009.
[35] M.S. Kodialam and T.V. Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," Proc. IEEE INFOCOM, 2003.
[36] A. Agah, K. Basu, and S.K. Das, "Security Enforcement in Wireless Sensor Networks: A Framework Based on Non-Cooperative Games," Pervasive and Mobile Computing, vol. 2, no. 2, pp. 137-158, 2006.
[37] X. Li and M.R. Lyu, "A Novel Coalitional Game Model for Security Issues in Wireless Networks," Proc. IEEE Global Telecomm. Conf. (GlobeCom '08), pp. 1962-1967, 2008.
[38] W. Wang, M. Chatterjee, and K. Kwiat, "Coexistence with Malicious Nodes: A Game Theoretic Approach," Proc. Int'l Conf. Game Theory for Networks (GAMENETS '09), pp. 277-286, 2009.
[39] J. Pita, M. Jain, J. Marecki, F.O. nez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus, "Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the LAX Airport," Proc. Seventh Int'l Joint Conf. Autonomous Agents and Multiagent Systems: Industrial Track (AAMAS '08), pp. 125-132, 2008.
[40] N. Basilico, N. Gatti, and F. Amigoni, "Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topologies," Proc. Eighth Int'l Joint Conf. Autonomous Agents and Multiagent Systems: Industrial Track (AAMAS '09), pp. 57-64, 2009.
[41] N. Basilico, N. Gatti, and F. Villa, "Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies," Proc. AAAI Conf. Artificial Intelligence (AAAI '10), 2010.
[42] O. Vaneky, Z. Yin, M. Jain, B. Boransky, M. Tambe, and M. Pechouceky, "Game-Theoretic Resource Allocation for Malicious Packet Detection in Computer Networks," Proc. 11th Int'l Joint Conf. Autonomous Agents and Multiagent Systems: Industrial Track (AAMAS '12), 2012.
38 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool