TSCD: A novel secure localization approach for wireless sensor networks

Honglong Chen, Wei Lou, Junchao Ma, Zhi Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

15 Citations (Scopus)

Abstract

Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location service. The localization issue in wireless sensor networks under the non-adversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied location service under the adversarial scenario. In this paper, we propose an attack-resistant localization scheme, called TSCD secure localization, to overcome the distance-consistent spoofing attack in wireless sensor networks. The main idea of the TSCD scheme is to firstly apply the temporal and spatial properties of locators to detect some attacked locators, and then utilize the consistent properties of the attacked locators and legitimate locators to find out other attacked locators. Simulation results demonstrate that the proposed scheme achieves better performance than existing approaches under the same network parameters.
Original languageEnglish
Title of host publicationProceedings - 2nd Int. Conf. Sensor Technol. Appl., SENSORCOMM 2008, Includes
Subtitle of host publicationMESH 2008 Conf. Mesh Networks; ENOPT 2008 Energy Optim. Wireless Sensors Networks; UNWAT 2008 Under Water Sensors Sys.
Pages661-666
Number of pages6
DOIs
Publication statusPublished - 17 Nov 2008
Event2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008 - Cap Esterel, France
Duration: 25 Aug 200831 Aug 2008

Conference

Conference2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008
CountryFrance
CityCap Esterel
Period25/08/0831/08/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Systems Engineering

Cite this