Information-theoretic approach for secure localization against sybil attack in wireless sensor network

  • PDF / 848,097 Bytes
  • 7 Pages / 595.276 x 790.866 pts Page_size
  • 99 Downloads / 195 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

Information‑theoretic approach for secure localization against sybil attack in wireless sensor network Arindam Giri1   · Subrata Dutta2 · Sarmistha Neogy3 Received: 6 February 2020 / Accepted: 8 November 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract The sensed data have limited or no use without knowing the location. So, estimating the location of sensors is an issue in Wireless Sensor Networks (WSNs). However, WSNs are vulnerable to malicious attacks like sybil attack affecting the accuracy of localization by forging one or many anchor identities. In this paper, an information-theoretic approach is used to detect if anchors are compromised by sybil attack. This technique can be adopted by any localization algorithm to yield secure localization against sybil attack in WSNs. Simulation results claim that it improves accuracy of localization even with sybil attack. Keywords  Wireless sensor networks · Sybil attack · Localization · Information theory

1 Introduction The design and production of low cost sensors have enabled successful applications in areas like healthcare, agriculture, livestock, smart city, ambient assisted living, etc. (Calvaresi et al. 2017; Giri et al. 2016). After deployment of sensors in an application area, sensed data are aggregated and collected and decision making is done at base station. Irrespective of application areas the collected data has a limited or no use without knowing the locations where from the data is collected. For example, irrigation may be initiated in the specific region of a crop field once the underlying sensors are localized in smart agriculture (Giri et al. 2020). In this context, location awareness becomes an essential task in every application of Wireless Sensor Network (WSN). * Arindam Giri [email protected] Subrata Dutta [email protected] Sarmistha Neogy [email protected] 1



Department of Computer Science and Engineering, Haldia Institute of Technology, Haldia, India

2



Department of Computer Science and Engineering, National Institute of Technology, Jamshedpur, India

3

Department of Computer Science and Engineering, Jadavpur University, Kolkata, India



Localization is the process by which the location of an unknown node is estimated in terms of the locations of few known nodes called anchors or beacon nodes. As attaching Global Positioning System (GPS) to every sensor is not feasible with respect to cost, only the anchors have GPS and all other unknown nodes estimate their locations with the help of those anchors. WSNs are distributed in nature and mostly used in unknown and probably hostile environment which makes sensors vulnerable to attacks by adversaries. An adversary may affect localization process by impersonating the identities of sensor nodes. As a result, location-aware applications may no longer be useful to the beneficiaries. Lack of security in location-aware applications like forest fire detection may result in estimating incorrect locations which may incur immense losses. S