ABSTRACT

Contents 12.1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 12.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 12.3 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

12.3.1 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 12.3.2 Attacks on Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

12.3.2.1 Distance Modification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 12.3.2.2 Wormhole Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 12.3.2.3 Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 12.3.2.4 Sybil Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

12.4 Sensor Network Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 12.5 Secure Localization Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

12.5.1 Verifiable Multilateration Based on Distance Bounding. . . 299 12.5.2 Secure Range Independent Localization . . . . . . . . . . . . . . . . . . . 301 12.5.3 Statistical Filtering of Malicious Signals . . . . . . . . . . . . . . . . . . . 302 12.5.4 Range-Based Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 12.5.5 Location Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 12.5.6 Comparison of Existing Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . 306

12.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

12.1 Abstract In this chapter we present a survey of “secure localization” systems for wireless sensor networks. Location information is an important component of sensor data in many wireless sensor networks. However, much of the earlier work in this area did not consider security aspects. Recently, research on location estimation systems that deal with a hostile environment has attracted much attention. We present a comprehensive survey of the several proposed secure localization techniques. We provide a taxonomy of the schemes, along with the important details of each scheme. We also present a comparison study of the main characteristics of these schemes.