Secure Node Localization in Mobile Sensor ... - Semantic Scholar

Report 2 Downloads 137 Views
18 International Journal of Wireless Networks and Broadband Technologies, 3(1), 18-33, January-March 2014

Secure Node Localization in Mobile Sensor Networks Rachit Mittal, Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, Gujarat, India Manik Lal Das, Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, Gujarat, India

ABSTRACT Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon based (WBB). The BB approach has been studied extensively under adversarial model and many algorithms based on BB approach have been proposed in literature in order to localize nodes in a secure manner. In contrast, WBB approach for node localization under adversarial model has not received substantial attention from researchers. In this paper, the authors discuss WBB approach for node localization under adversarial model. The authors discuss static and dynamic key settings for node localization using WBB approach. The authors present an improved protocol for node localization in mobile sensor networks, aiming at minimizing the impact of node capture threats. The authors consider the LEAP (Localized Encryption and Authentication Protocol) (Zhu, Setia, & Jajodia, 2003) and the LOCK (Localized Combinatorial Keying) (Eltoweissy, Moharrum, & Mukkamala, 2006) as the building blocks of their proposed scheme. The authors show that the improved protocol provides effective node localization in a secure manner with minimal node capture threats. Keywords:

Beacon Node, Distance Bounding, Key Management, Localization, Sensor Networks

INTRODUCTION Localization is a process by which sensor nodes in Wireless Sensor Networks (WSN) determine spatial relationships between themselves (Srinivasan, & Wu, 2007; Rasmussen, Capkun, &

Cagalj, 2007; Mi, Stankovic, & Stoleru, 2012). The determination of spatial relationship signifies that the networks are able to assign location coordinates to each other either with reference to a coordinate system localized to a particular network or with reference to a global coordi-

DOI: 10.4018/ijwnbt.2014010102 Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

International Journal of Wireless Networks and Broadband Technologies, 3(1), 18-33, January-March 2014 19

nate system such as GPS (Global Positioning System). Broadly, the approaches used toward localization consist of two types of nodes: • •

Beacon node / Anchor node: Node, who knows its physical location (either via GPS receiver or by manual configuration); Regular node / Non-Beacon node: Node, who does not know its position and no special hardware requires to acquire its information.

There are many advantages of knowing the location information of sensor nodes in WSN, which include: (i) network coverage checking and location-based information querying; (ii) selective forwarding instead of broadcasting information; (iii) neighbour discovery; and (iv) data aggregation after finding neighboring node: •



Beacon-based approach: Beacon-based (BB) approach uses Beacon node(s) as the basis for computing the location coordinates of other non-Beacon nodes. The idea is to implement the Beacon node with directional antennas and the non-Beacon nodes localizing themselves based on the range of whichever antenna they belong to. Naturally, the security is an important concern in BB approach when an adversary attempts to compromise some Beacon nodes (Liu, Ning, Liu, Wang, & Du, 2008). There are some algorithms based on BB approach, such as ROPE (Robust Position Estimation) (Lazos, Poovendran, & Capkun, 2005), SeRLoc (Secure Localization) (Lazos, Poovendran, 2004) and HirLoc (High Resolution Localization) (Lazos & Poovendran, 2006); Without Beacon-based approach: Without Beacon-based (WBB) approach is inspired by the notion of automating localization process without using Beacon nodes. The idea is to develop a localized coordinate system, where the coordinates/ position of nodes is assigned with reference

to other nodes in the network. However, when communication is established with other networks, the local coordinate system can be converted to a global coordinate system using Beacon nodes. One of the main advantages of BB approach is scalability. Generally, the WBB approach involves with following three steps to establish a localized coordinate system in the network. 1. Discovery of one-hop neighbors and sharing a pairwise key with other node; 2. Calculation of distance to every neighboring node; 3. Assigning coordinates to neighboring nodes. In the context of node localization, the WBB approach seems to be found more suitable for WSN, because (i) in BB approach, a large number of beacon nodes required to localize all non-beacon nodes; (ii) BB approach is not scalable well in comparison to WBB approach; (iii) in BB approach, localization is completely dependent on Beacon nodes: •



Our contributions: As GPS-based localization is economically costly and GPS signal is not always available, we consider the WBB approach for sensor nodes localization. We discuss related approaches for localizing neighbouring nodes in WSN. Then, we present an improved protocol to minimize the impact of node compromise attacks in WSN. We also discuss the trade-off in our choice of LEAP (Localized Encryption and Authentication Protocol) (Zhu, Setia, & Jajodia, 2003) as the key management scheme along with comparisons with schemes; Organization of the paper: The paper is organized as follows. The next section describes some neighbour discovery algorithms for static and dynamic key management settings. The section following presents an improved protocol for secure

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

14 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/secure-node-localization-inmobile-sensor-networks/104628

Related Content Wireless Sensor Network to Support Intelligent Transport Systems H Ranganathan (2012). Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management (pp. 528-547).

www.irma-international.org/chapter/wireless-sensor-network-supportintelligent/62753/ Emerging Technologies in Transportation Systems: Challenges and Opportunities Antonio Guerrero-Ibáñez, Carlos Flores-Cortés, Pedro Damián-Reyes and JRG Pulido (2012). International Journal of Wireless Networks and Broadband Technologies (pp. 12-40).

www.irma-international.org/article/emerging-technologies-in-transportationsystems/94552/ An Efficient Data Dissemination Scheme for Warning Messages in Vehicular Ad Hoc Networks Muhammad A. Javed and Jamil Y. Khan (2011). International Journal of Wireless Networks and Broadband Technologies (pp. 55-72).

www.irma-international.org/article/efficient-data-dissemination-schemewarning/64627/ Evaluating the Usability of Multimedia, Mobile and Network-Based Products Philip Kortum (2012). International Journal of Wireless Networks and Broadband Technologies (pp. 10-17).

www.irma-international.org/article/evaluating-the-usability-of-multimediamobile-and-network-based-products/90274/ Joint Angular and Time Diversity of Multi-Antenna CDMA Systems in Wireless Fading Channels Feng She, Hsiao Hwa Chen and Hongyang Li (2011). International Journal of Wireless Networks and Broadband Technologies (pp. 1-14).

www.irma-international.org/article/joint-angular-time-diversity-multi/53016/