Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing the reliability of node localization data from a game theoretical viewpoint. In particular, we an the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. Thus, we were able to compute an upper bound to the error that an attacker can induce in localization data, given the number of available verifiers. We focused cm the maximum, deception, that is the distance between the inferred position of an unknown node and the actual one: we found that if the verifiers are placed opportunely, the deception is at, most 25% of the power range, and can be halved by triplicating the number of the verifiers.

A localization game in wireless sensor networks

SICARI, SABRINA SOPHY
2010-01-01

Abstract

Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing the reliability of node localization data from a game theoretical viewpoint. In particular, we an the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. Thus, we were able to compute an upper bound to the error that an attacker can induce in localization data, given the number of available verifiers. We focused cm the maximum, deception, that is the distance between the inferred position of an unknown node and the actual one: we found that if the verifiers are placed opportunely, the deception is at, most 25% of the power range, and can be halved by triplicating the number of the verifiers.
2010
T. Alpcan and L. Buttyan and J. Baras
Decision and Game Theory for Security - International Conference GameSec 2010
9783642171963
International Conference on Decision and Game Theory for Security (GameSec 2010)
Berlin
22-23 November 2010
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11383/1718782
 Attenzione

L'Ateneo sottopone a validazione solo i file PDF allegati

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 2
social impact