SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

23
SeRLoc: Secure Range- Independent Localization for Wireless Sensor Networks Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA

description

SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA. Problem: - PowerPoint PPT Presentation

Transcript of SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Page 1: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRLoc: Secure Range-Independent Localization forWireless Sensor Networks

Presenter: Yawen Wei

Author: Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA

Page 2: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Problem: Enabling nodes of a wireless sensor network to determine their location even in the presence of malicious adversaries.

Design Goal: Decentralized implementation Resource efficiency Robustness against security threats

Page 3: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Outline

Overview SeRloc Algorithm Comparison & Simulation Conclusion

Page 4: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Overview

What is Localization System? How to determine position? (Schemes)

1.range-dependent

GPS, Active Badge, Active Bat, Cricket

2.range-independent

DV-hop, amorphous localization, APIT, Centroid Why security?

Page 5: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Range-dependent Location System

Time of arrival (TOA) Angle of arrival Signal strength RF, acoustic, infrared and

ultrasound Disadvantages

(x1,y1); (x2,y2);(x3,y3)

Page 6: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRloc Algorithm

Network Model Location Determination Security Scheme Threat Analysis

Page 7: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Network Model N: unknown locations L: known locations and orientations, “locators” spatial homogeneous Poisson point process

Page 8: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRloc: Location Determination Secure Range-Independent Localization

a. the locator’s coordinates

b. the angles of the antenna boundary lines

c. R: the locator-sensor-communication range

d. Overlapping region

e. CoG (Center of Gravity)

Page 9: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Step 1: Locators heard

Step 2: Search area

Page 10: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Determination of the search area

A rectangular area of size less than

A rectangular area of size greater than

Page 11: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Step 3: Overlapping region-Majority vote

Step 4: Location estimation

Page 12: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRloc: Security Scheme Encryption:

Global symmetric key Sensor s & locator shares pairwise key

Locator ID authenticationCollision-resistant hash function (e.g. MD5)

Beacon of locator Li

Page 13: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRloc: Threat Analysis Types: Wormhole / Sybil / Compromised nodes Wormhole attack

Packet leshes: geographical / temporal Time measuring in challenge-reply scheme

Page 14: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Wormholes1. Sector uniqueness property

: area of locators heard by origin point

: area of locators heard by s

Page 15: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Wormholes2. Communication range violation property

A sensor cannot hear two locators that are more than 2R apart

Page 16: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
Page 17: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

the first message: q = k − 1 the last message: q = 0 All locators wait for a q Ts ∗ time

Page 18: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

SeRloc: Threat Analysis Sybil Attack and Compromised nodes

Multiple network entitiesAssume sensor identitiesAssume locators (Not directly heard)

Page 19: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Outline

Overview SeRloc Algorithm Comparison & Simulation Conclusion

Page 20: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Comparison

Dv-hop and Amorphous localization

Page 21: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Comparison

APIT localization

5

Page 22: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Simulation Localization Error vs. Locators heard Localization Error vs. Antenna Sectors Localization Error vs. Sector Error Localization Error vs. GPS Error Communication Cost vs. Locators Heard

Page 23: SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Conclusion

Secure localization in WSN Range independent Decentralized Security mechanisms Threats Higher accuracy and fewer locators