Pollution attack: a new attack against localization in wireless sensor networks

  • Authors:
  • Yingpei Zeng;Jiannong Cao;Shigeng Zhang;Shanqing Guo;Li Xie

  • Affiliations:
  • State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China and Department of Computing, Hong Kong Polytechnic University, Hong Kong;Department of Computing, Hong Kong Polytechnic University, Hong Kong;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China and Department of Computing, Hong Kong Polytechnic University, Hong Kong;School of Computer Science and Technology, Shandong University, Jinan, P.R. China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China

  • Venue:
  • WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many secure localization algorithms have been proposed. In these algorithms, collusion attack is usually considered as the strongest attack when evaluating their performance. Also, for ensuring correct localization under the collusion attack, a necessary number of normal beacons are needed and a lower bound on this number has been established (assuming the errors of distance measurements are ignorable). In this paper, we introduce pollution attack, a more powerful attack which can succeed even when the number of normal beacons is more than the lower bound. In this attack, victim node is misled to a special chosen location, which results in a confusion of compromised beacon with normal beacon. We propose a new metric to measure the vulnerability of a normal location reference set to pollution attack, and develop two algorithms to efficiently compute the value of the proposed metric. We also present a method to judge whether the output of the localization algorithm is credible under pollution attack. Simulation results show that the pollution attack can succeed with high probability.