@inproceedings{df852ac8a2a64b76b5da422b5cbfc1fb,
title = "Conflicting-set-based wormhole attack resistant localization in wireless sensor networks",
abstract = "The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters.",
keywords = "Conflicting Set, Secure Localization, Wireless Sensor Networks, Wormhole Attack",
author = "Honglong Chen and Wei Lou and Zhi Wang",
year = "2009",
month = nov,
day = "9",
doi = "10.1007/978-3-642-02830-4_23",
language = "English",
isbn = "3642028292",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "296--309",
booktitle = "Ubiquitous Intelligence and Computing - 6th International Conference, UIC 2009, Proceedings",
note = "6th International Conference on Ubiquitous Intelligence and Computing, UIC 2009 ; Conference date: 07-07-2009 Through 09-07-2009",
}