The active badge location system
ACM Transactions on Information Systems (TOIS)
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Energy-efficient surveillance system using wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
An analysis of a large scale habitat monitoring application
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Discovering Network Topology in the Presence of Byzantine Faults
IEEE Transactions on Parallel and Distributed Systems
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Localization in presence of multipath effect in wireless sensor networks
WWIC'12 Proceedings of the 10th international conference on Wired/Wireless Internet Communication
Countermeasures against sybil attacks in WSN based on proofs-of-work
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 5.23 |
The position verification problem is an important building block for a large subset of wireless sensor network (WSN) applications. Indeed, the performance of the WSN degrades significantly when misbehaving nodes report false location information in order to fake their actual position. In this paper we propose the first deterministic distributed protocol for an accurate identification of faking sensors in a WSN. Our scheme does not rely on a subset of trusted nodes that cooperate and are not allowed to misbehave. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most @?n2@?-2 faking sensors. When the time of flight (ToF) technique is used, our protocol manages at most @?n2@?-3 misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is @?n2@?-1. Thus, our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More specifically, our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.