Please use this identifier to cite or link to this item:
Title: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
Authors: Chen, H
Lou, W 
Wang, Z
Keywords: Conflicting set
Secure localization
Wireless sensor networks
Wormhole attack
Issue Date: 2009
Publisher: Springer
Source: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics), 2009, v. 5585, p. 296-309 How to cite?
Journal: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics) 
Abstract: The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters.
Description: The 6th International Conference on Ubiquitous Intelligence and Computing (UIC 2009), Brisbane, Australia, July 7-9, 2009
ISBN: 978-3-642-02829-8
ISSN: 0302-9743
EISSN: 1611-3349
DOI: 10.1007/978-3-642-02830-4_23
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Citations as of Jul 10, 2018

Page view(s)

Citations as of Jul 16, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.