Conflicting-set-based wormhole attack resistant localization in wireless sensor networks

Honglong Chen, Wei Lou, Zhi Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

21 Citations (Scopus)

Abstract

The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters.
Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 6th International Conference, UIC 2009, Proceedings
Pages296-309
Number of pages14
DOIs
Publication statusPublished - 9 Nov 2009
Event6th International Conference on Ubiquitous Intelligence and Computing, UIC 2009 - Brisbane, QLD, Australia
Duration: 7 Jul 20099 Jul 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5585 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Ubiquitous Intelligence and Computing, UIC 2009
Country/TerritoryAustralia
CityBrisbane, QLD
Period7/07/099/07/09

Keywords

  • Conflicting Set
  • Secure Localization
  • Wireless Sensor Networks
  • Wormhole Attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Conflicting-set-based wormhole attack resistant localization in wireless sensor networks'. Together they form a unique fingerprint.

Cite this