SLAT: Secure Localization with Attack Tolerance
نویسندگان
چکیده
Accurate and secure localization is essential to the correct operation of many applications of sensor networks. However, existing methods lack concrete security mechanisms or are not resilient to beacon node compromise. We address the limitations of present approaches in this paper through the Secure Localization with Attack Tolerance (SLAT) protocol. In SLAT, non-beacon nodes estimate their positions by calculating the intersection of multiple authenticated beacon messages. Message authentication prevents wholesale beacon location report forgeries. To combat compromised beacons, we develop and analyze a location reporting algorithm that ensures that compromised beacons have little ability to affect location estimates. Moreover, the degree to which a malicious location report affects an estimate is inversely proportional to its distance from the true location (as reported by the majority of properly operating beacons). We evaluate the protocol via simulation within a range of sensor networks and protocol parameters. Our results indicate that even large numbers of compromises only nominally affect location estimates. For example, we show that compromising 40 out of 200 nodes in a simulated environment only increases the average location estimate error from 3 meters to 5 meters. Such results apply across a wide range of networks, topologies, and hardware platforms.
منابع مشابه
Secure Localization in Wireless Sensor Networks: A Survey
Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important research subject. When WSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole and sybil attacks. Two issues about unknown nodes’ secure localization need to be considered. First, the attackers may disguise as or attack the unknown and anchor nodes to interfere with localizat...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کامل