SeRLoc: Secure range-independent localization for wireless sensor networks

Loukas Lazos, Radha Poovendran

Research output: Chapter in Book/Report/Conference proceedingConference contribution

298 Scopus citations

Abstract

In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location-aware WSN applications, it is essential to ensure that sensors can determine their location, even in the presence of malicious adversaries. In this paper we address the problem of enabling sensors of WSN to determine their location in an un-trusted environment. Since localization schemes based on distance estimation are expensive for the resource constrained sensors, we propose a range-independent localization algorithm called SeRLoc. SeRLoc is distributed algorithm and does not require any communication among sensors. In addition, we show that SeRLoc is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and compromised sensors. To the best of our knowledge, ours is the first work that provides a security-aware range-independent localization scheme for WSN. We present a threat analysis and comparison of the performance of SeRLoc with state-of-the-art range-independent localization schemes.

Original languageEnglish (US)
Title of host publicationProceedings of the 2004 ACM Workshop on Wireless Security, WiSe
Pages21-30
Number of pages10
StatePublished - 2004
EventProceedings of the 2004 ACM Workshop on Wireless Security, WiSe - Philadelphia, PA, United States
Duration: Oct 1 2004Oct 1 2004

Publication series

NameProceedings of the 2004 ACM Workshop on Wireless Security, WiSe

Other

OtherProceedings of the 2004 ACM Workshop on Wireless Security, WiSe
CountryUnited States
CityPhiladelphia, PA
Period10/1/0410/1/04

Keywords

  • Range-independent
  • Secure Localization
  • Wireless sensor networks

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'SeRLoc: Secure range-independent localization for wireless sensor networks'. Together they form a unique fingerprint.

Cite this