Adaptive filter theory (2nd ed.)
Adaptive filter theory (2nd ed.)
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Calibration as parameter estimation in sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Localization from mere connectivity
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks
IEEE Transactions on Mobile Computing
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
WALRUS: wireless acoustic location with room-level resolution using ultrasound
Proceedings of the 3rd international conference on Mobile systems, applications, and services
The Horus WLAN location determination system
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Distributed weighted-multidimensional scaling for node localization in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Relative location estimation in wireless sensor networks
IEEE Transactions on Signal Processing
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Hi-index | 0.00 |
In sensor networks, secure localization—determining sensors' locations in a hostile, untrusted environment—is a challenging, but very important, problem that has not yet been addressed effectively. This paper presents an attack-tolerant localization protocol, called Verification for Iterative Localization (VeIL), under which sensors cooperatively safeguard the localization service. By exploiting the high spatiotemporal correlation existing between adjacent nodes, VeIL realizes (a) adaptive management of a profile for normal localization behavior, and (b) distributed detection of false locations advertised by attackers by comparing them against the profile of normal behavior. Our analysis and simulation results show that VeIL achieves high-level tolerance to many critical attacks, and is computationally feasible on resource-limited sensors.