2009
DOI: 10.1155/2010/627039
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

Abstract: Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…3) Distance Consistency Approach: In [25] the author has proposed a distance-consistency-based secure localization method to detect wormhole attacks. Three different types of nodes locators, sensors, and attackers are deployed in the network.…”
Section: Wormhole Attack Detection Mechanismmentioning
confidence: 99%
“…3) Distance Consistency Approach: In [25] the author has proposed a distance-consistency-based secure localization method to detect wormhole attacks. Three different types of nodes locators, sensors, and attackers are deployed in the network.…”
Section: Wormhole Attack Detection Mechanismmentioning
confidence: 99%
“…The performance of the proposed algorithm is measured in two ways which are the average location error and traffic. The average location error is defined as [15][16][17][18][19][20]: (10) where respectively, is the true coordinate position and the estimation coordinate position of node and its communication radius.…”
Section: Simulationmentioning
confidence: 99%
“…If packet drop is greater than packet sent there there is presence of wormhole attack. Author [ [10], [11]] discussed the impact of wormhole on localization proposed novel distance consistency based secure localization scheme and make to collect conflicting set of abnormalities of message exchange among neighbor locator only if there is no packet loss which is downside of this methodology. Graph theory approach was developed by author [12] for the prevention of wormhole attack with the use of location aware guard nodes using "local broadcast keys" which are encrypted and valid only between instant one hop neighbors.…”
Section: Literature Surveymentioning
confidence: 99%
“…Graph theory approach was developed by author [12] for the prevention of wormhole attack with the use of location aware guard nodes using "local broadcast keys" which are encrypted and valid only between instant one hop neighbors. [ [10], [11]] defined security extensions to OLSR to prevent generation of false messages. [13] used hash chain and digital signature whereas, [14] used signing OLSR packet with digital signature.…”
Section: Literature Surveymentioning
confidence: 99%