TY - GEN
T1 - Attack-resistant location estimation in sensor networks
AU - Liu, Donggang
AU - Ning, Peng
AU - Du, Wenliang Kevin
PY - 2005
Y1 - 2005
N2 - Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks In hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable In hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks. The first method filters out malicious beacon signals on the basis of the "consistency" among multiple beacon signals, while the second method tolerates malicious beacon signals by adopting an iteratlvely refined voting scheme. Both methods can survive malicious attacks even if the attacks bypass authentication, provided that the benign beacon signals constitute the majority of the "consistent" beacon signals. This paper also presents the implementation of these techniques on MICA2 motes running TinyOS, and the evaluation through both simulation and field experiments. The experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.
AB - Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks In hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable In hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks. The first method filters out malicious beacon signals on the basis of the "consistency" among multiple beacon signals, while the second method tolerates malicious beacon signals by adopting an iteratlvely refined voting scheme. Both methods can survive malicious attacks even if the attacks bypass authentication, provided that the benign beacon signals constitute the majority of the "consistent" beacon signals. This paper also presents the implementation of these techniques on MICA2 motes running TinyOS, and the evaluation through both simulation and field experiments. The experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.
UR - http://www.scopus.com/inward/record.url?scp=33144467903&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33144467903&partnerID=8YFLogxK
U2 - 10.1109/IPSN.2005.1440904
DO - 10.1109/IPSN.2005.1440904
M3 - Conference contribution
AN - SCOPUS:33144467903
SN - 0780392019
SN - 9780780392014
T3 - 2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
SP - 99
EP - 106
BT - 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
T2 - 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
Y2 - 25 April 2005 through 27 April 2005
ER -