@inproceedings{d9e0b8aadf8a499696ab0c52a9d0a06f,
title = "How secure are secure localization protocols in WSNs?",
abstract = "Remote monitoring and gathering information are the main objectives behind deploying Wireless Sensor Networks (WSNs). Besides WSN issues due to communication and computation restricted resources (low energy, limited memory computational speed and bandwidth), securing sensor networks is one of the major challenges these networks have to face. In particular, the security of sensors localization is a fundamental building block for many applications such as efficient routing. In this paper, we introduce a new threat model that combines classical Wormhole attacks (i.e. an attacker receives packets at one location in the network, tunnels and replays them at another remote location using a powerful transceiver as an out of band channel) with false neighborhood topology information sent by the wormhole endpoints themselves or by some colluding compromised nodes. We show using intensive simulations how this clever attacker that would exploit the neighborhood topology information can easily defeat two representative secure localization schemes. We also present some possible countermeasures and the first corresponding results.",
keywords = "bors, defend, estima, lazos, alexan",
author = "Ch{\'e}rifa Boucetta and Kaafar, {Mohamed Ali} and Marine Minier",
year = "2011",
doi = "10.1007/978-3-642-23583-2_12",
language = "English",
isbn = "9783642235825",
volume = "57",
series = "Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering",
pages = "164--178",
booktitle = "Sensor Systems and Software",
}