• DocumentCode
    4306
  • Title

    On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment

  • Author

    Bartolini, Novella ; Bongiovanni, Giancarlo ; La Porta, Thomas ; Silvestri, Stefano

  • Author_Institution
    Dept. of Comput. Sci., Sapienza Univ. of Rome, Rome, Italy
  • Volume
    13
  • Issue
    11
  • fYear
    2014
  • fDate
    Nov. 2014
  • Firstpage
    2592
  • Lastpage
    2605
  • Abstract
    The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.
  • Keywords
    mobile radio; telecommunication security; wireless sensor networks; DRM; SecureVF; energy consumption; light-weight algorithm; mobile sensor deployment; network coverage goal; opportunistic movement; virtual force approach; Analytical models; Bills of materials; Force; Mobile communication; Mobile computing; Radio frequency; Security; Mobile sensors; self-deployment; virtual force approach;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2014.2308209
  • Filename
    6748037