Deterministic Secure Positioning in Wireless Sensor Networks

  • Authors:
  • Sylvie Delaët;Partha Sarathi Mandal;Mariusz A. Rokicki;Sébastien Tixeuil

  • Affiliations:
  • LRI - UMR, Univ. Paris Sud, 8623, France;Department of Computer Science & Engineering, Indian Institute of Technology Kanpur, Kanpur, India 208 016;CNRS, France and LRI - UMR, Univ. Paris Sud, 8623, France;Univ. Pierre & Marie Curie - Paris 6, LIP6 - UMR 7606, France and INRIA Futurs, Project-team Grand Large,

  • Venue:
  • DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location information in order to fake their actual position. In this paper we propose the first deterministic distributed protocol for accurate identification of faking sensors in a WSN. Our scheme does notrely on a subset of trustednodes that cooperate and are not allowed to misbehave. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN.On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\lfloor \frac{n}{2} \rfloor-2$ faking sensors. When the time of flight (ToF) technique is used, our protocol manages at most $\lfloor \frac{n}{2} \rfloor - 3$ misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is $\lceil \frac{n}{2}\rceil -1$. Thus, our scheme is almost optimal with respect to the number of faking sensors.We discuss application of our technique in the trusted sensor model. More specifically, our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.