SLAW: Secure Localization Against Wormhole Attacks Using Conflicting Sets

Free registration required

Executive Summary

The wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link to another point. Such kind of attack can cause severe problems in wireless sensor networks, especially deteriorate the routing process and the localization process. In this paper, the authors propose a secure localization scheme against wormhole attacks, which includes three phases: wormhole attack detection, neighboring locators differentiation and secure localization.

  • Format: PDF
  • Size: 286.27 KB