EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Real-Time Mobility Tracking Algorithms for Cellular Networks Based on Kalman Filtering
IEEE Transactions on Mobile Computing
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Providing VANET security through active position detection
Computer Communications
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
Computer Communications
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
IEEE Wireless Communications
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
Central misbehavior evaluation for VANETs based on mobility data plausibility
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Hi-index | 0.00 |
A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital signature. In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting power utilized to carry out an exploit. Hyperbolic position bounding (HPB) provides a mechanism to probabilistically estimate the candidate location of an attack message's originator using received signal strength (RSS) reports, without assuming knowledge of the transmitting power. We specialize the applicability of HPB into the realm of vehicular networks and provide alternate HPB algorithms to improve localization precision and computational efficiency. We extend HPB for tracking the consecutive locations of a mobile attacker.We evaluate the localization and tracking performance of HPB in a vehicular scenario featuring a variable number of receivers and a known navigational layout. We find that HPB can position a transmitting device within stipulated guidelines for emergency services localization accuracy.