scispace - formally typeset
Open AccessProceedings ArticleDOI

Attack-resistant location estimation in sensor networks

Reads0
Chats0
TLDR
Two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks are presented and the experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.
Abstract
Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks. The first method filters out malicious beacon signals on the basis of the "consistency" among multiple beacon signals, while the second method tolerates malicious beacon signals by adopting an it era lively refined voting scheme. Both methods can survive malicious attacks even if the attacks bypass authentication, provided that the benign beacon signals constitute the majority of the "consistent" beacon signals. This paper also presents the implementation of these techniques on MICA2 motes running TinyOS, and the evaluation through both simulation and field experiments. The experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Sensor network security: a survey

TL;DR: This paper identifies the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first, and gives a holistic overview of security issues.

Challenges in Securing Vehicular Networks

Bryan Parno, +1 more
TL;DR: A set of security primitives that can be used as the building blocks of secure applications for vehicular networks are proposed, and their success and safety will depend on viable security solutions acceptable to consumers, manufacturers and governments.
Journal ArticleDOI

Secure positioning in wireless networks

TL;DR: This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
Journal ArticleDOI

Location-based compromise-tolerant security mechanisms for wireless sensor networks

TL;DR: A suite of location-based compromise-tolerant security mechanisms, based on a new cryptographic concept called pairing, by binding private keys of individual nodes to both their IDs and geographic locations, and an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity are proposed.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Proceedings ArticleDOI

GPSR: greedy perimeter stateless routing for wireless networks

TL;DR: Greedy Perimeter Stateless Routing is presented, a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions and its scalability on densely deployed wireless networks is demonstrated.
Proceedings ArticleDOI

Directed diffusion: a scalable and robust communication paradigm for sensor networks

TL;DR: This paper explores and evaluates the use of directed diffusion for a simple remote-surveillance sensor network and its implications for sensing, communication and computation.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI

GPS-less low-cost outdoor localization for very small devices

TL;DR: This work reviews localization techniques and evaluates the effectiveness of a very simple connectivity metric method for localization in outdoor environments that makes use of the inherent RF communications capabilities of these devices.
Related Papers (5)