Abstract
Geolocalization of nodes in a wireless sensor network is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring the integrity of the system. We analyze the problem of location-unaware nodes determining their location in the presence of misbehaving neighboring nodes that provide false data during the execution of the process. We divide and present potential misbehaving nodes in four different adversary models, based on their capacities. We provide algorithms that enable the location-unaware nodes to determine their coordinates in the presence of these adversaries. The algorithms always work for a given number of neighbors provided that the number of misbehaving nodes is below a certain threshold, which is determined for each adversary model.
Similar content being viewed by others
Notes
We use the standard convention for binomial coefficients that \({s \choose t} = 0\) when s < t.
References
Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 11(6):6–28
Bahl P, Padmanabhan VN, Balachandran A (2000) Enhancements to the RADAR user location and tracking system. Microsoft Research, Technical Report MSR-TR-2000-12, Microsoft, p 13
Barbeau M, Kranakis E, Krizanc D, Morin P (2004) Improving distance based geographic location techniques in sensor networks. In: 3rd international conference on AD-HOC networks & wireless (ADHOC-NOW’04). Lecture notes in computer science, vol 3158. Springer, Berlin, pp 197–210
Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: 24th annual conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, NJ, pp 1917–1928
Capkun S, Cagalj M, Srivastava M (2006) Secure localization with hidden and mobile base stations. In: 25th annual conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1–10
Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun 24(2):221–232
Delaet S, Mandal P, Rokicki M, Tixeuil S (2008) Deterministic secure positioning in wireless sensor networks. In: IEEE international conference on distributed computing in sensor networks (DCOSS). Springer, Berlin, pp 469–477
Doherty L, Ghaoui LE (2002) Convex position estimation in wireless sensor networks. In: 20th annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1655–1663
Douceur JR (2002) The sybil attack. In: 1st international workshop on peer-to-peer systems (IPTPS 2002). Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260
Garcia-Alfaro J, Barbeau M, Kranakis E (2009) Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: 7th annual communication networks and services research (CNSR) conference. IEEE, Piscataway, NJ, pp 86–93
He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: 9th annual international conference on mobile computing and networking. ACM, New York, NY, pp 81–95
Hwang J, He T, Kim Y (2008) Secure localization with phantom node detection. Ad Hoc Networks 6(7):1031–1050
Ji X, Zha H (2004) Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. In: 23rd annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 2652–2661
Lazos L, Poovendran R (2005) SeRLoc: robust localization for wireless sensor networks. Transactions on Sensor Networks, 1st edn, vol 1. ACM, New York, NY, pp 73–100
Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: 4th international symposium on information processing in sensor networks. IEEE, Piscataway, NJ, pp 324–331
Liu D, Ning P, Liu, Du WK (2005) Detecting malicious Beacon nodes for secure location discovery in wireless sensor networks. In: 25th international conference on distributed computing systems. IEEE, Piscataway, NJ, pp 609–619
Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39
Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: 3rd international symposium on information processing in sensor networks. ACM, New York, NY, pp 259–268
Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In: 6th annual international conference on mobile computing and networking. ACM, New York, NY, pp 32–43
Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: 2nd workshop on wireless security. ACM, New York, NY, pp 1–10
Savvides A, Han C, Strivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: 7th annual international conference on mobile computing and networking. ACM, New York, NY, pp 166–179
Acknowledgements
This work was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC), Mathematics of Information Technology and Complex Systems (MITACS), Spanish Ministry of Science (grants TSI2007-65406-C03-03 E-AEGIS and CONSOLIDER-INGENIO 2010 CSD2007-00004 ARES), and Institut TELECOM (project LOCHNESS, Futurs et Ruptures CPCR7322). We would also like to thank Prof. Jean-Marc Robert for fruitful discussions on the topic of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Garcia-Alfaro, J., Barbeau, M. & Kranakis, E. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. Ann. Telecommun. 66, 535–552 (2011). https://doi.org/10.1007/s12243-010-0221-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-010-0221-z