TY - JOUR
T1 - LAD
T2 - Localization anomaly detection for wireless sensor networks
AU - Du, Wenliang
AU - Fang, Lei
AU - Peng, Ning
N1 - Funding Information:
Du’s work was supported by Grants ISS-0219560 and CNS-0430252 from the US National Science Foundation, and also by Grant W911NF-05-1-0247 from the US Army Research Office (ARO). Ning’s work was supported by Grants CNS-0430223 and CAREER-0447761 from the US National Science Foundation. ∗ Corresponding author. Fax: +1 315 443 1122.
PY - 2006/7
Y1 - 2006/7
N2 - In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of location discovery (localization) schemes have been proposed. Most of these schemes share a common feature: they use some special nodes, called beacon nodes, which are assumed to know their own locations (e.g., through GPS receivers or manual configuration). Other sensors discover their locations based on the reference information provided by these beacon nodes. Most of the beacon-based localization schemes assume a benign environment, where all beacon nodes are supposed to provide correct reference information. However, when the sensor networks are deployed in a hostile environment, where beacon nodes can be compromised, such an assumption does not hold anymore. In this paper, we propose a general scheme to detect localization anomalies that are caused by adversaries. Our scheme is independent from the localization schemes. We formulate the problem as an anomaly intrusion detection problem, and we propose a number of ways to detect localization anomalies. We have conducted simulations to evaluate the performance of our scheme, including the false positive rates, the detection rates, and the resilience to node compromises.
AB - In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of location discovery (localization) schemes have been proposed. Most of these schemes share a common feature: they use some special nodes, called beacon nodes, which are assumed to know their own locations (e.g., through GPS receivers or manual configuration). Other sensors discover their locations based on the reference information provided by these beacon nodes. Most of the beacon-based localization schemes assume a benign environment, where all beacon nodes are supposed to provide correct reference information. However, when the sensor networks are deployed in a hostile environment, where beacon nodes can be compromised, such an assumption does not hold anymore. In this paper, we propose a general scheme to detect localization anomalies that are caused by adversaries. Our scheme is independent from the localization schemes. We formulate the problem as an anomaly intrusion detection problem, and we propose a number of ways to detect localization anomalies. We have conducted simulations to evaluate the performance of our scheme, including the false positive rates, the detection rates, and the resilience to node compromises.
KW - Anomaly detection
KW - Location discovery
KW - Security
KW - Sensor networks
UR - http://www.scopus.com/inward/record.url?scp=33744548460&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33744548460&partnerID=8YFLogxK
U2 - 10.1016/j.jpdc.2005.12.011
DO - 10.1016/j.jpdc.2005.12.011
M3 - Article
AN - SCOPUS:33744548460
SN - 0743-7315
VL - 66
SP - 874
EP - 886
JO - Journal of Parallel and Distributed Computing
JF - Journal of Parallel and Distributed Computing
IS - 7
ER -