TY - GEN
T1 - A Consistency-based secure localization scheme against wormhole attacks in WSNs
AU - Chen, Honglong
AU - Lou, Wei
AU - Wang, Zhi
PY - 2009/9/28
Y1 - 2009/9/28
N2 - Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.
AB - Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.
KW - Consistency
KW - Secure localization
KW - Wireless sensor networks
KW - Wormhole attack
UR - http://www.scopus.com/inward/record.url?scp=70349323304&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-03417-6_36
DO - 10.1007/978-3-642-03417-6_36
M3 - Conference article published in proceeding or book
SN - 3642034160
SN - 9783642034169
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 368
EP - 377
BT - Wireless Algorithms, Systems, and Applications - 4th International Conference, WASA 2009, Proceedings
T2 - 4th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009
Y2 - 16 August 2009 through 18 August 2009
ER -