Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
LAD: localization anomaly detection for wireless sensor networks
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Organizing a global coordinate system from local information on an ad hoc sensor network
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
HiRLoc: high-resolution robust localization for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In wireless sensor networks(WSNs), sensors' locations play a critical role in many applications. A number of localization schemes have been proposed to discover the locations of regular sensors based on a few beacon nodes, which are assumed to know their locations through GPS or manual configuration. However, the localization process is vulnerable to malicious attacks. The wormhole attack is a particularly challenging one since the adversary does not need to compromise any nodes or have access to any cryptographic keys. This paper introduces WRL, a beacon-based, wormhole-resistent localization scheme based on DV-hop propagation method. The scheme can detect wormholes without any special hardware requirements on each node more than DV-hop method has. The beacon node pairs which have detected that a wormhole link exists on the path between them will not use the stained hop counts to estimate average size for one hop, saving regular sensors being influenced by the wormhole during their location computing process. Simulation results show that the localization accuracy of WRL under wormhole attacks is almost the same with that of DV-hop in a benign circumstance.