Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
DRBTS: Distributed Reputation-based Beacon Trust System
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
WASA '07 Proceedings of the International Conference on Wireless Algorithms,Systems and Applications
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets
IEEE Transactions on Software Engineering
Secure localization and authentication in ultra-wideband sensor networks
IEEE Journal on Selected Areas in Communications - Part 1
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This paper addresses the problem of secure localization in hostile environments. We propose a secure and efficient localization scheme to enhance the security function of Ultra-Wideband sensor networks. The method does not only provide strong security against distance reduction attacks, but also distance enlargement attacks. Furthermore, it is a device-independent scheme with strong function of more accurate localization. Based on Petri net, an attack-driven model is also developed. , which provides a formal method to verify our scheme when considering distance enlargement attacks. State analysis, which proves that the potential insecure states are unreachable, shows that the model can provide strong security in the environment with these attacks.