TY - JOUR
T1 - Secure localization with phantom node detection
AU - Hwang, Joengmin
AU - He, Tian
AU - Kim, Yongdae
PY - 2008/9/1
Y1 - 2008/9/1
N2 - In an adversarial environment, various kinds of attacks become possible if malicious nodes could claim fake locations that are different from their physical locations. In this paper, we propose a secure localization mechanism that detects existence of these nodes, termed as phantom nodes, without relying on any trusted entities, an approach significantly different from the existing ones. The proposed mechanism enjoys a set of nice features. First, it does not have any central point of attack. All nodes play the role of verifier, by generating local map, i.e. a view constructed based on ranging information from its neighbors. Second, this distributed and localized construction results in strong robustness against adversaries: even when the number of phantom nodes is greater than that of honest nodes, we can filter out most of the phantom nodes. Our analytical results as well as simulations under realistic noisy settings demonstrate that the proposed mechanism is effective in the presence of a large number of phantom nodes.
AB - In an adversarial environment, various kinds of attacks become possible if malicious nodes could claim fake locations that are different from their physical locations. In this paper, we propose a secure localization mechanism that detects existence of these nodes, termed as phantom nodes, without relying on any trusted entities, an approach significantly different from the existing ones. The proposed mechanism enjoys a set of nice features. First, it does not have any central point of attack. All nodes play the role of verifier, by generating local map, i.e. a view constructed based on ranging information from its neighbors. Second, this distributed and localized construction results in strong robustness against adversaries: even when the number of phantom nodes is greater than that of honest nodes, we can filter out most of the phantom nodes. Our analytical results as well as simulations under realistic noisy settings demonstrate that the proposed mechanism is effective in the presence of a large number of phantom nodes.
KW - Decentralized algorithm
KW - Localization
KW - Location verification
KW - Secure localization
KW - Sensor networks
KW - Speculative algorithm
UR - http://www.scopus.com/inward/record.url?scp=46449131175&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=46449131175&partnerID=8YFLogxK
U2 - 10.1016/j.adhoc.2007.10.005
DO - 10.1016/j.adhoc.2007.10.005
M3 - Article
AN - SCOPUS:46449131175
VL - 6
SP - 1031
EP - 1050
JO - Ad Hoc Networks
JF - Ad Hoc Networks
SN - 1570-8705
IS - 7
ER -