Open Access Open Access  Restricted Access Subscription or Fee Access

Impact on Wormhole Attack Using Label Based DV- Hop Localization in Wireless Sensor Networks

Nithyashree S., Karthik S

Abstract


Localization of a node is an important issue in the wireless sensor network as its broad applications in monitoring, emergency rescue operations and battlefield surveillance, etc. Many localization schemes has been used to discover the locations of sensors using beacon nodes, as they are assumed to know their locations through GPS or manual configuration. DV-Hop localization process performs well with the help of beacon nodes that have the ability of self-positioning. But, the localization process is vulnerable to various malicious attacks, one such attack is wormhole, if the network is invaded by a wormhole attack, the attacker tunnels the packets through wormhole link which causes adverse effects on the DV-Hop localization process. Detection of wormhole attack is a particularly challenging, as the adversary does not need to compromise any nodes or have access to any cryptographic keys. In this paper, we analyze the adverse effects of wormhole attack on DV-Hop localization scheme. Simulation results shows secure localization labeling scheme and which detects wormhole attack and prevent its impacts with a high probability.

Keywords: Wireless sensor networks, DV-Hop localization, wormhole attack, beacon node, sensor node


 


Full Text:

PDF

References


He T., Huang C., Blum B., et al. Range-Free Localization Schemes for Large Scale Sensor Networks, ACM T Embed Comp Syst November 2005; 4(4): 877–906p.

Bulusu N., Heidemann J., Estrin D., GPS-less Low Cost Outdoor Localization for Very Small Devices, 2000; 7: 28–34p.

Niculescu D., Nath B., Ad Hoc Positioning System (APS) using AOA, in Proc. of IEEE INFOCOM, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications 2003; 3: 1734–1743p.

Boukerche A., Oliveira H. A. B. F., Nakamura E. F., et al. Secure Localization Algorithms for Wireless Sensor Networks, IEEE Communications Magazine, 2008; 96–101p.

Liu D., Ning P., Du W., Attack-Resistant Location Estimation in Sensor Networks, in Proc. of IEEE IPSN, 2005.

Capkun S., Hubaux J. P., Secure Positioning of Wireless Devices with Application to Sensor Networks, in Proc. of IEEEINFOCOM, 2005.

Anjum F., Pandey S., Agrawal P., Secure Localization in Sensor Networks using Transmission Range Variation, in Proc. of IEEE MASS, 2005.

Capkun S., Cagalj M., Srivastava M., Secure Localization with Hidden and Mobile Base Stations, in Proc. of IEEE INFOCOM, 2006.

Lazos L., Poovendran R., Capkun S., ROPE: Robust Position Estimation in Wireless Sensor Networks, in Proc. of IEEE IPSN, 2005.

Liu D., Ning P., Du W., Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks, in Proc. of IEEE ICDCS, 2005.

Li Z., Trappe W., Zhang Y., et al. Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, in Proc. of IEEE IPSN, 2005.

[12] Hu Y. C., Perrig A., Johnson D. B., Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks, in Proc. of IEEEINFOCOM, 2003.

Wang W., Bhargava B., Visualization of Wormholes in Sensor Networks, in Proc. of ACM Wi Sec, 2004.

Wang W., Lu A., Interactive Wormhole Detection and Evaluation, Info Visual 2007; 6(1): 3–17p.

Xu Y., Chen G., Ford J., et al. Detecting Wormhole Attacks in Wireless Sensor Networks, in Proc. of IFIP, 2008.

Maheshwari R., Gao J., Das S. R., Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information, in Proc. of IEEE Infocom, 2007.

Lazos L. Poovendran R., SeR Loc: Robust Localization for Wireless Sensor Networks, ACM T Sensor Netw 2005; 1(1): 73–100p.

Lazos L., Poovendran R., HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks, IEEE J Select Area Commun 2006; 24(2): 233–246p.

Chen H., Lou W., Wang Z., A Consistency-based Secure Localization Scheme Against Wormhole Attacks in WSNs, in Proc. of the International Conference on Wireless Algorithms, Systems and Applications (WASA), 2009.

Chen H., Lou W., Sun X., et al. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency, Eurasip J Wireless Commun Netw, Special Issue on Wireless Network Algorithms, Systems, and Applications 2009.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/