Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
WASA '07 Proceedings of the International Conference on Wireless Algorithms,Systems and Applications
Resilient secure localization and detection of colluding attackers in WSNs
ADHOC-NOW'12 Proceedings of the 11th international conference on Ad-hoc, Mobile, and Wireless Networks
Hi-index | 0.00 |
To solve the secure localization problems, a number of secure localization schemes have been developed at present. However, most of these techniques cannot survive malicious attacks in hostile environments where a majority of beacons launch colluding attacks. In this paper, we propose a novel localization algorithm called TMCA (tolerate majority-colluding attacks) that is well suited to WSN which is a resource constrained environment. The TMCA is a distributed algorithm based on the cooperation of non-beacon neighbor nodes and consistency of the Minimum Mean Square Error. TMCA is robust against well known attacks on a WSN such as the wormhole attack, the Sybil attack and Replay attack. Even when there are more colluding malicious anchors than benign anchors on a WSN, it can still work well to generate precise localization results. At the same time, it has reasonable and acceptable communication cost and algorithm complexity. Through simulations, we compare the performance of TMCA with other secure localization schemes and show that TMCA has more efficient and resilient performance.