Skip to main content
Log in

Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

Geolocalization of nodes in a wireless sensor network is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring the integrity of the system. We analyze the problem of location-unaware nodes determining their location in the presence of misbehaving neighboring nodes that provide false data during the execution of the process. We divide and present potential misbehaving nodes in four different adversary models, based on their capacities. We provide algorithms that enable the location-unaware nodes to determine their coordinates in the presence of these adversaries. The algorithms always work for a given number of neighbors provided that the number of misbehaving nodes is below a certain threshold, which is determined for each adversary model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. We use the standard convention for binomial coefficients that \({s \choose t} = 0\) when s < t.

References

  1. Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 11(6):6–28

    Article  Google Scholar 

  2. Bahl P, Padmanabhan VN, Balachandran A (2000) Enhancements to the RADAR user location and tracking system. Microsoft Research, Technical Report MSR-TR-2000-12, Microsoft, p 13

  3. Barbeau M, Kranakis E, Krizanc D, Morin P (2004) Improving distance based geographic location techniques in sensor networks. In: 3rd international conference on AD-HOC networks & wireless (ADHOC-NOW’04). Lecture notes in computer science, vol 3158. Springer, Berlin, pp 197–210

    Google Scholar 

  4. Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: 24th annual conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, NJ, pp 1917–1928

    Chapter  Google Scholar 

  5. Capkun S, Cagalj M, Srivastava M (2006) Secure localization with hidden and mobile base stations. In: 25th annual conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1–10

    Google Scholar 

  6. Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun 24(2):221–232

    Article  Google Scholar 

  7. Delaet S, Mandal P, Rokicki M, Tixeuil S (2008) Deterministic secure positioning in wireless sensor networks. In: IEEE international conference on distributed computing in sensor networks (DCOSS). Springer, Berlin, pp 469–477

    Google Scholar 

  8. Doherty L, Ghaoui LE (2002) Convex position estimation in wireless sensor networks. In: 20th annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 1655–1663

    Google Scholar 

  9. Douceur JR (2002) The sybil attack. In: 1st international workshop on peer-to-peer systems (IPTPS 2002). Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260

    Google Scholar 

  10. Garcia-Alfaro J, Barbeau M, Kranakis E (2009) Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: 7th annual communication networks and services research (CNSR) conference. IEEE, Piscataway, NJ, pp 86–93

    Chapter  Google Scholar 

  11. He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: 9th annual international conference on mobile computing and networking. ACM, New York, NY, pp 81–95

    Chapter  Google Scholar 

  12. Hwang J, He T, Kim Y (2008) Secure localization with phantom node detection. Ad Hoc Networks 6(7):1031–1050

    Article  Google Scholar 

  13. Ji X, Zha H (2004) Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling. In: 23rd annual joint conference of the IEEE computer and communications societies. IEEE, Piscataway, NJ, pp 2652–2661

    Google Scholar 

  14. Lazos L, Poovendran R (2005) SeRLoc: robust localization for wireless sensor networks. Transactions on Sensor Networks, 1st edn, vol 1. ACM, New York, NY, pp 73–100

    Google Scholar 

  15. Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: 4th international symposium on information processing in sensor networks. IEEE, Piscataway, NJ, pp 324–331

    Google Scholar 

  16. Liu D, Ning P, Liu, Du WK (2005) Detecting malicious Beacon nodes for secure location discovery in wireless sensor networks. In: 25th international conference on distributed computing systems. IEEE, Piscataway, NJ, pp 609–619

    Google Scholar 

  17. Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39

    Article  MATH  Google Scholar 

  18. Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: 3rd international symposium on information processing in sensor networks. ACM, New York, NY, pp 259–268

    Google Scholar 

  19. Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In: 6th annual international conference on mobile computing and networking. ACM, New York, NY, pp 32–43

    Chapter  Google Scholar 

  20. Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: 2nd workshop on wireless security. ACM, New York, NY, pp 1–10

    Google Scholar 

  21. Savvides A, Han C, Strivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: 7th annual international conference on mobile computing and networking. ACM, New York, NY, pp 166–179

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC), Mathematics of Information Technology and Complex Systems (MITACS), Spanish Ministry of Science (grants TSI2007-65406-C03-03 E-AEGIS and CONSOLIDER-INGENIO 2010 CSD2007-00004 ARES), and Institut TELECOM (project LOCHNESS, Futurs et Ruptures CPCR7322). We would also like to thank Prof. Jean-Marc Robert for fruitful discussions on the topic of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joaquin Garcia-Alfaro.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Garcia-Alfaro, J., Barbeau, M. & Kranakis, E. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. Ann. Telecommun. 66, 535–552 (2011). https://doi.org/10.1007/s12243-010-0221-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-010-0221-z

Keywords

Navigation