HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

Deterministic Secure Positioning in Wireless Sensor Networks

Sylvie Delaët 1 Partha Sarathi Mandal 2 Mariusz Rokicki 1 Sébastien Tixeuil 2, 3
2 GRAND-LARGE - Global parallel and distributed computing
CNRS - Centre National de la Recherche Scientifique : UMR8623, Inria Saclay - Ile de France, UP11 - Université Paris-Sud - Paris 11, LIFL - Laboratoire d'Informatique Fondamentale de Lille, LRI - Laboratoire de Recherche en Informatique
Abstract : Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identification of faking sensors in a WSN. Our scheme does \emph{not} rely on a subset of \emph{trusted} nodes that are not allowed to misbehave and are known to every node in the network. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\lfloor \frac{n}{2} \rfloor-2$ faking sensors. Also, when the time of flight (ToF) technique is used, our protocol manages at most $\lfloor \frac{n}{2} \rfloor - 3$ misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is $\lceil \frac{n}{2}\rceil -1$. Thus our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More precisely our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download

Contributor : Rapport de Recherche Inria Connect in order to contact the contributor
Submitted on : Monday, October 22, 2007 - 9:28:28 AM
Last modification on : Friday, February 4, 2022 - 4:17:51 AM
Long-term archiving on: : Tuesday, September 21, 2010 - 2:41:04 PM


Files produced by the author(s)


  • HAL Id : inria-00179056, version 2
  • ARXIV : 0710.3824


Sylvie Delaët, Partha Sarathi Mandal, Mariusz Rokicki, Sébastien Tixeuil. Deterministic Secure Positioning in Wireless Sensor Networks. [Research Report] RR-6326, INRIA. 2007, pp.31. ⟨inria-00179056v2⟩



Record views


Files downloads