The Community for Technology Leaders
Green Image
Issue No. 01 - Jan.-Feb. (2014 vol. 11)
ISSN: 1545-5971
pp: 72-85
Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers. Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the 40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the first player employs a number of verifiers to do VM computations and the second player controls a malicious node. The verifiers aim at securely localizing malicious nodes, while malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to game theory, the potentialities of VM are analyzed with the aim of improving the defender's strategy. We found that the best placement for verifiers is an equilateral triangle with edge equal to the power range $(R)$, and maximum deception in the undecided region is approximately $(0.27R)$. Moreover, we characterizedâin terms of the probability of choosing an unknown node to examine furtherâthe strategies of the players.
Games, Monitoring, Robustness, Wireless sensor networks, Electronic mail, Game theory,wireless sensor networks, Game theory, localization games, security
Nicola Basilico, Nicola Gatti, Mattia Monga, Sabrina Sicari, "Security Games for Node Localization through Verifiable Multilateration", IEEE Transactions on Dependable and Secure Computing, vol. 11, no. , pp. 72-85, Jan.-Feb. 2014, doi:10.1109/TDSC.2013.30
87 ms
(Ver )