Proactive attacker localization in wireless LAN
ACM SIGCOMM Computer Communication Review
A Secure Framework for Location Verification in Pervasive Computing
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Seeing is not believing: visual verifications through liveness analysis using mobile devices
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad-hoc and sensor networks.