On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment
- 25 February 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Mobile Computing
- Vol. 13 (11), 2592-2605
- https://doi.org/10.1109/tmc.2014.2308209
Abstract
The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.Keywords
This publication has 25 references indexed in Scilit:
- Dependable wireless sensor networks for reliable and secure humanitarian relief applicationsAd Hoc Networks, 2014
- Stealthy Attacks in Wireless Ad Hoc Networks: Detection and CountermeasureIEEE Transactions on Mobile Computing, 2010
- Random-walk based approach to detect clone attacks in wireless sensor networksIEEE Journal on Selected Areas in Communications, 2010
- A practical secure neighbor verification protocol for wireless sensor networksPublished by Association for Computing Machinery (ACM) ,2009
- Towards provable secure neighbor discovery in wireless networksPublished by Association for Computing Machinery (ACM) ,2008
- Secure Location Verification with Hidden and Mobile Base StationsIEEE Transactions on Mobile Computing, 2008
- High-Accuracy Point Positioning with Low-Cost GPS ReceiversNAVIGATION: Journal of the Institute of Navigation, 2007
- Location verification and trust management for resilient geographic routingJournal of Parallel and Distributed Computing, 2007
- Energy Analysis of Public-Key Cryptography for Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- The sybil attack in sensor networksPublished by Association for Computing Machinery (ACM) ,2004