Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

LAD: localization anomaly detection for wireless sensor networks

Published: 01 July 2006 Publication History

Abstract

In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of location discovery (localization) schemes have been proposed. Most of these schemes share a common feature: they use some special nodes, called beacon nodes, which are assumed to know their own locations (e.g., through GPS receivers or manual configuration). Other sensors discover their locations based on the reference information provided by these beacon nodes. Most of the beacon-based localization schemes assume a benign environment, where all beacon nodes are supposed to provide correct reference information. However, when the sensor networks are deployed in a hostile environment, where beacon nodes can be compromised, such an assumption does not hold anymore. In this paper, we propose a general scheme to detect localization anomalies that are caused by adversaries. Our scheme is independent from the localization schemes. We formulate the problem as an anomaly intrusion detection problem, and we propose a number of ways to detect localization anomalies. We have conducted simulations to evaluate the performance of our scheme, including the false positive rates, the detection rates, and the resilience to node compromises.

References

[1]
{1} P. Bahl, V.N. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, in: Proceedings of the IEEE INFOCOM, March 2000, pp. 775-784.]]
[2]
{2} P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, in: Proceedings of the Third ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 1999, pp. 48-55.]]
[3]
{3} P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, ACM Wireless Networks 7 (6) (2001) 609-616.]]
[4]
{4} N. Bulusu, J. Heidemann, D. Estrin, GPS-less low cost outdoor localization for very small devices, in: IEEE Personal Communications Magazine, October 2000, pp. 28-34.]]
[5]
{5} N. Bulusu, J. Heidemann, D. Estrin, Density adaptive algorithms for beacon placement, in: Proceedings IEEE ICDCS, Phoenix, AZ, April 2001.]]
[6]
{6} L. Doherty, K.S. Pister, L.E. Ghaoui, Convex optimization methods for sensor node position estimation, in: Proceedings of INFOCOM'01, 2001.]]
[7]
{7} L. Fang, W. Du, P. Ning, A beacon-less location discovery scheme for wireless sensor networks, in: Proceedings of IEEE INFOCOM, Miami, FL, USA, March 13-17, 2005.]]
[8]
{8} A. Harter, A. Hopper, P. Steggles, A. Ward, F. Webster, The anatomy of a context-aware application, in: Proceedings of MOBICOM'99, Seattle, Washington, 1999.]]
[9]
{9} T. He, C. Huang, B.M. Blum, J.A. Stankovic, T.F. Abdelzaher, Range-free localization schemes in large scale sensor networks, in: Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom '03), 2003.]]
[10]
{10} B. Hofmann-Wellenhof, H. Lichtenegger, J. Collins, Global Positioning System: Theory and Practice, fourth yd., Springer, New York, 1997.]]
[11]
{11} X. Hong, K. Xu, M. Gerla, Scalable routing protocols for mobile ad hoc networks, IEEE Network Mag (4), 2002.]]
[12]
{12} Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: Proceedings of IEEE Infocomm 2003, April 2003.]]
[13]
{13} B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless networks, in: Proceedings of ACM MobiCom 2000, 2000.]]
[14]
{14} Y.B. Ko, N.H. Vaidya, Location-aided routing (lar) in mobile ad hoc networks, in: Proceedings of ACM/IEEE MOBICOM 98), October 1998, pp. 66-75.]]
[15]
{15} L. Lazos, R. Poovendran, Serloc: Secure range-independent localization for wireless sensor networks, in: ACM Workshop on Wireless Security (ACM WiSe 2004), Philadelphia, PA, October 1, 2004.]]
[16]
{16} A. Leon-Garcia, Probability and Random Processes for Electrical Engineering, second yd., Addison-Wesley, Reading, MA, 1994.]]
[17]
{17} R. Nagpal, H. Shrobe, J. Bachrach, Organizing a global coordinate system from local information on an ad hoc sensor network, in: IPSN'03, 2003.]]
[18]
{18} A. Nasipuri, K. Li, A directionality based location discovery scheme for wireless sensor networks, in: Proceedings of ACM WSNA'02, September 2002.]]
[19]
{19} D. Niculescu, B. Nath, Ad hoc positioning system (APS) using AoA, in: Proceedings of IEEE INFOCOM 2003, April 2003, pp. 1734-1743.]]
[20]
{20} D. Niculescu, B. Nath, DV based positioning in ad hoc networks, Telecommun. Syst. 22 (1-4) (2003) 267-280.]]
[21]
{21} N.B. Priyantha, A. Chakraborty, H. Balakrishnan, The cricket location-support system, in: Proceedings of MOBICOM, Seattle, Washington'00, August 2000.]]
[22]
{22} N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security (WiSe 2003), 2003.]]
[23]
{23} A. Savvides, C. Han, M. Srivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, in: Proceedings of ACM MobiCom '01, July 2001, pp. 166-179.]]
[24]
{24} A. Savvides, H. Park, M. Srivastava, The bits and flops of the n-hop multilateration primitive for node localization problems, in: Proceedings of ACM WSNA '02, September 2002.]]
[25]
{25} Y. Xu, J. Heidemann, D. Estrin, Geography-informed energy conservation for ad hoc routing, in: Proceedings of ACM MobiCom 2000, Rome, Italy, July 2001.]]

Cited By

View all
  • (2021)Wireless Node Localization under Hostile Radio Environment using Smart AntennaWireless Personal Communications: An International Journal10.1007/s11277-020-07763-8116:3(1815-1836)Online publication date: 1-Feb-2021
  • (2016)Distance outlier detection with a mobile beacon in wireless sensor networks localisationInternational Journal of Security and Networks10.1504/IJSN.2016.07839211:3(160-166)Online publication date: 1-Jan-2016
  • (2010)WRLProceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I10.5555/1981573.1981588(51-56)Online publication date: 23-Jul-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Parallel and Distributed Computing
Journal of Parallel and Distributed Computing  Volume 66, Issue 7
19th International parallel and distributed processing symposium
July 2006
116 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 July 2006

Author Tags

  1. anomaly detection
  2. location discovery
  3. security
  4. sensor networks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Wireless Node Localization under Hostile Radio Environment using Smart AntennaWireless Personal Communications: An International Journal10.1007/s11277-020-07763-8116:3(1815-1836)Online publication date: 1-Feb-2021
  • (2016)Distance outlier detection with a mobile beacon in wireless sensor networks localisationInternational Journal of Security and Networks10.1504/IJSN.2016.07839211:3(160-166)Online publication date: 1-Jan-2016
  • (2010)WRLProceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I10.5555/1981573.1981588(51-56)Online publication date: 23-Jul-2010
  • (2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010
  • (2010)Elliptical anomalies in wireless sensor networksACM Transactions on Sensor Networks10.1145/1653760.16537676:1(1-28)Online publication date: 5-Jan-2010
  • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
  • (2008)Security co-existence of wireless sensor networks and RFID for pervasive computingComputer Communications10.1016/j.comcom.2008.05.03531:18(4294-4303)Online publication date: 1-Dec-2008
  • (2007)Secure verification of location claims with simultaneous distance modificationProceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security10.5555/1781694.1781717(181-195)Online publication date: 9-Dec-2007
  • (2007)On the robustness of range-free localization in wireless sensor networksThe Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops10.1145/1577222.1577241(1-7)Online publication date: 14-Aug-2007
  • (2007)Analysis of range-free anchor-free localization in a wsn under wormhole attackProceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems10.1145/1298126.1298185(344-351)Online publication date: 23-Oct-2007
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media