This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Secure Localization and Location Verification in Sensor Networks Yann-Hang Lee 1 , Vikram Phadke 2 , Jin Wook Lee 3 , and Amit Deshmukh 4 1 Computer Science and Engineering Dept., Arizona State University, Tempe, AZ 85287, USA 2 Qualcomm USA, San Diego,CA 92121, USA 3 Samsung Advanced Institute of Technology(SAIT), South Korea 4 Siemens USA, San Diego, CA 92126, USA Abstract. Evolving networks of wireless sensing nodes have many attractive applications. Localization, that is to determine the locations of sensor nodes, is a key enabler for many applications of sensor networks. As sensor networks move closer to extensive deployments, security becomes a major concern, resulting in a new demand for secure localization and location proving systems. In this pa- per, we propose a secure localization system based on a secure hop algorithm. A location verification system that allows the base station to verify the locations of sensor nodes is also presented. It prevents a node from falsifying reported loca- tion information. The evaluation of the secure localization system shows that the proposed scheme performs well under a range of scenarios tested and is resilient against an attacker creating incorrect location information in other nodes. 1 Introduction Distributed sensor nodes can employ communications to form wireless ad hoc networks capable of collaborative processing and collecting valuable information. The physical location of these sensor nodes can prove to be useful in geographic routing, node au- thentication and location critical applications, such as target tracking. To determine the locations of sensor nodes, either centralized approach  or distributed algorithms   have been proposed. Niculescu et al.  insisted that a positioning algorithm has to be distributed because in a very large network of low memory and low bandwidth nodes, even shuttling the entire topology to a server in a hop by hop manner would put too high a strain on the nodes close to the observer(also called base station). When sensor networks are deployed in remote and often hostile environments, secu- rity properties of these networks shall be critical. Attacks on such nodes can disrupt a distributed location sensing algorithm resulting in nodes storing and propagating erro- neous location information. Hence, it is imperative to look into secure localization for sensor networks with the consideration of compromised nodes. Most of the existing work in localization does not consider any security issues. To best of our knowledge, there have been three works proposed for location verification This work was supported by DARPA (Defense Advanced Research Projects Agency, USA) IXO NEST (Network Embedded Software Technology) program....
View Full Document
- Fall '10
- Computer Science, hash function, Verification, Cryptographic hash function, one-way hash function, hop count