A guide to simulation (2nd ed.)
A guide to simulation (2nd ed.)
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Secure Location Verification with Hidden and Mobile Base Stations
IEEE Transactions on Mobile Computing
Secure localization with phantom node detection
Ad Hoc Networks
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Hi-index | 0.00 |
Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification use trusted verifiers, which are in fact vulnerable to attacks by malicious nodes. They also depend on some distance estimation techniques, which are not accurate in noisy channels (mediums). In this article, we propose a secure position verification scheme for WSNs in noisy channels without relying on any trusted entities. Our verification scheme detects and filters out all malicious nodes from the network with a very high probability.