Sensor Systems and Software. Second International ICST Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers

Research Article

A Centralized Approach for Secure Location Verification in Wireless Sensor Networks

Download
433 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23583-2_11,
        author={Abbas Ghebleh and Maghsoud Abbaspour and Saman Homayounnejad},
        title={A Centralized Approach for Secure Location Verification in Wireless Sensor Networks},
        proceedings={Sensor Systems and Software. Second International ICST Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers},
        proceedings_a={S-CUBE},
        year={2012},
        month={5},
        keywords={Wireless Sensor Network Location Verification Security},
        doi={10.1007/978-3-642-23583-2_11}
    }
    
  • Abbas Ghebleh
    Maghsoud Abbaspour
    Saman Homayounnejad
    Year: 2012
    A Centralized Approach for Secure Location Verification in Wireless Sensor Networks
    S-CUBE
    Springer
    DOI: 10.1007/978-3-642-23583-2_11
Abbas Ghebleh1,*, Maghsoud Abbaspour1,*, Saman Homayounnejad1,*
  • 1: Shahid Beheshti University
*Contact email: ab.ghebleh@mail.sbu.ac.ir, maghsoud@sbu.ac.ir, samaaan@aut.ac.ir

Abstract

Location information of sensors is crucial in many applications of Wireless Sensor Networks (WSNs). A lot of work has been done for estimating sensors’ location in the network but these approaches are mostly designed without considering security issues which is critical in WSNs. So we should verify the location of sensors to ensure that estimated location is correct. In this paper we propose a novel approach for verifying sensors’ location having minor overhead on the network while not using any additional hardware. This approach is centralized and the verification process is performed in the base station that is much more powerful than sensors and is able to perform more sophisticated tests. Simulation studies verify that this approach is able to detect different attacks and anomalies in sensors’ location.