skip to main content
10.1145/2897845.2897926acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper
Public Access

Inside Attack Filtering for Robust Sensor Localization

Published: 30 May 2016 Publication History

Abstract

Several solutions have recently been proposed to securely estimate sensor positions even when there is malicious location information which distorts the estimate. Some of those solutions are based on the Minimum Mean Square Estimation (MMSE) methods which efficiently estimate sensor positions. Although such solutions can filter out most of malicious information, if an attacker knows the position of a target sensor, the attacker can significantly alter the position information. In this paper, we introduce such a new attack, called Inside-Attack, and a technique that is able to detect and filter out malicious location information. Based on this technique, we propose an algorithm to effectively estimate sensor positions. We illustrate the impact of inside attacks on the existing algorithms and report simulation results concerning our algorithm.

References

[1]
Atmel, http://www.atmel.com/images/doc8228.pdf.
[2]
ns2, http://www.isi.edu/nsnam/ns/.
[3]
S. Capkun and J.-P. Hubaux. Secure positioning in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2):221--232, Feb 2006.
[4]
B. Cheng, R. Hudson, F. Lorenzelli, L. Vandenberghe, and K. Yao. Distributed gauss-newton method for node loclaization in wireless sensor networks. In IEEE SPAWC, 2005.
[5]
R. Garg, A. Varna, and M. Wu. Gradient descent approach for secure localization in resource constrained wireless sensor networks. In IEEE Acoustics Speech and Signal Processing, 2010.
[6]
B. Karp and H. T. Kung. Gpsr: Greedy perimeter stateless routing for wireless networks. In ACM MobiCom, 2000.
[7]
L. Lazos, R. Poovendran, and S. Capkun. Rope: robust position estimation in wireless sensor networks. In IPSN, 2005.
[8]
Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust statistical methods for securing wireless localization in sensor networks. In IPSN, 2005.
[9]
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In ACM SASN, 2003.
[10]
D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du. Attack-resistant location estimation in wireless sensor networks. ACM TISSEC, 11(4):22:1--22:39, July 2008.
[11]
A. Savvides, C.-C. Han, and M. B. Strivastava. Dynamic fine-grained localization in ad-hoc networks of sensors. In Proceedings of MobiCom, 2001.
[12]
C. Wang, A. Liu, and P. Ning. Cluster-based minimum mean square estimation for secure and resilient localization in wireless sensor networks. In WASA, 2007.
[13]
J. Won and E. Bertino. The full version of this paper. available from the authors.
[14]
J. Won and E. Bertino. Inside attack filtering for robust sensor localization. In IEEE ICDCS, pages 796--797, June 2015.
[15]
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie. Pollution attack: A new attack against localization in wireless sensor networks. In IEEE WCNC, 2009.
[16]
S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao. Towards a theory of robust localization against malicious beacon nodes. In IEEE INFOCOM, 2008.

Cited By

View all
  • (2023)Military and Security Applications: CybersecurityEncyclopedia of Optimization10.1007/978-3-030-54621-2_761-1(1-10)Online publication date: 16-Mar-2023
  • (2019)Robust Sensor Localization against Known Sensor Position AttacksIEEE Transactions on Mobile Computing10.1109/TMC.2018.288357818:12(2954-2967)Online publication date: 1-Dec-2019
  • (2017)A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.78(1876-1886)Online publication date: Jun-2017

Index Terms

  1. Inside Attack Filtering for Robust Sensor Localization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
    May 2016
    958 pages
    ISBN:9781450342339
    DOI:10.1145/2897845
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. localization
    2. security
    3. wireless sensor networks

    Qualifiers

    • Short-paper

    Funding Sources

    Conference

    ASIA CCS '16
    Sponsor:

    Acceptance Rates

    ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)64
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Military and Security Applications: CybersecurityEncyclopedia of Optimization10.1007/978-3-030-54621-2_761-1(1-10)Online publication date: 16-Mar-2023
    • (2019)Robust Sensor Localization against Known Sensor Position AttacksIEEE Transactions on Mobile Computing10.1109/TMC.2018.288357818:12(2954-2967)Online publication date: 1-Dec-2019
    • (2017)A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.78(1876-1886)Online publication date: Jun-2017

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media