GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Security in wireless sensor networks: Research Articles
Wireless Communications & Mobile Computing
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
Relative location estimation in wireless sensor networks
IEEE Transactions on Signal Processing
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
IEEE Wireless Communications
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN), which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.