Secure localization against wormhole attacks using conflicting sets

Honglong Chen, Wei Lou, Zhi Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

10 Citations (Scopus)

Abstract

The wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link to another point. Such kind of attack can cause severe problems in wireless sensor networks, especially deteriorate the routing process and the localization process. In this paper, we propose a secure localization scheme against wormhole attacks, which includes three phases: wormhole attack detection, neighboring locators differentiation and secure localization. The main idea of the proposed secure localization scheme is to build a so-called conflicting set for each locator according to the abnormalities of message exchanges among neighboring locators, which is used to differentiate the dubious locators from valid locators for the secure localization. The simulation results show that the proposed scheme outperforms the existed schemes under different network parameters.
Original languageEnglish
Title of host publication2010 IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010
Pages25-33
Number of pages9
DOIs
Publication statusPublished - 1 Dec 2010
Event2010 IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010 - Albuquerque, NM, United States
Duration: 9 Dec 201011 Dec 2010

Conference

Conference2010 IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010
Country/TerritoryUnited States
CityAlbuquerque, NM
Period9/12/1011/12/10

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Secure localization against wormhole attacks using conflicting sets'. Together they form a unique fingerprint.

Cite this