Conflicting-set-based wormhole attack resistant localization in wireless sensor networks

21Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chen, H., Lou, W., & Wang, Z. (2009). Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5585 LNCS, pp. 296–309). https://doi.org/10.1007/978-3-642-02830-4_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free