PolyU IR
 

PolyU Institutional Repository >
Computing >
COMP Conference Papers & Presentations >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/4384

Title: Secure localization against wormhole attacks using conflicting sets
Authors: Chen, Honglong
Lou, Wei
Wang, Zhi
Subjects: Cryptography
Distance measurement
Maximum likelihood estimation
Sensor systems
Wireless sensor networks
Issue Date: 2010
Publisher: IEEE
Citation: IPCCC 2010 : 29th IEEE International Performance Computing and Communications Conference : proceedings, 9-11 December 2010, Albuquerque, NM, USA, p. 25-33.
Abstract: The wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link to another point. Such kind of attack can cause severe problems in wireless sensor networks, especially deteriorate the routing process and the localization process. In this paper, we propose a secure localization scheme against wormhole attacks, which includes three phases: wormhole attack detection, neighboring locators differentiation and secure localization. The main idea of the proposed secure localization scheme is to build a so-called conflicting set for each locator according to the abnormalities of message exchanges among neighboring locators, which is used to differentiate the dubious locators from valid locators for the secure localization. The simulation results show that the proposed scheme outperforms the existed schemes under different network parameters.
Description: DOI: 10.1109/PCCC.2010.5682340
Rights: © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Type: Conference Paper
URI: http://hdl.handle.net/10397/4384
ISBN: 978-1-4244-9330-2
ISSN: 1097-2641
Appears in Collections:COMP Conference Papers & Presentations

Files in This Item:

File Description SizeFormat
ipccc2010b.pdfPre-published version275.66 kBAdobe PDFView/Open



Facebook Facebook del.icio.us del.icio.us LinkedIn LinkedIn


All items in the PolyU Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
No item in the PolyU IR may be reproduced for commercial or resale purposes.

 

© Pao Yue-kong Library, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
Powered by DSpace (Version 1.5.2)  © MIT and HP
Feedback | Privacy Policy Statement | Copyright & Restrictions - Feedback