A Consistency-based secure localization scheme against wormhole attacks in WSNs

Honglong Chen, Wei Lou, Zhi Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

4 Citations (Scopus)

Abstract

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.
Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 4th International Conference, WASA 2009, Proceedings
Pages368-377
Number of pages10
DOIs
Publication statusPublished - 28 Sept 2009
Event4th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009 - Boston, MA, United States
Duration: 16 Aug 200918 Aug 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5682 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009
Country/TerritoryUnited States
CityBoston, MA
Period16/08/0918/08/09

Keywords

  • Consistency
  • Secure localization
  • Wireless sensor networks
  • Wormhole attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A Consistency-based secure localization scheme against wormhole attacks in WSNs'. Together they form a unique fingerprint.

Cite this