Proceedings of the Third International Workshop on Fast Software Encryption
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Accuracy characterization for metropolitan-scale Wi-Fi localization
Proceedings of the 3rd international conference on Mobile systems, applications, and services
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Hot topic: physical-layer network coding
Proceedings of the 12th annual international conference on Mobile computing and networking
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A practical evaluation of radio signal strength for ranging-based localization
ACM SIGMOBILE Mobile Computing and Communications Review
Wireless sensor network localization techniques
Computer Networks: The International Journal of Computer and Telecommunications Networking
Embracing wireless interference: analog network coding
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A survey of key management schemes in wireless sensor networks
Computer Communications
Kalman filters for time delay of arrival-based source localization
EURASIP Journal on Applied Signal Processing
Self-management in chaotic wireless deployments
Wireless Networks
Tracking mobile nodes using RF Doppler shifts
Proceedings of the 5th international conference on Embedded networked sensor systems
Communications of the ACM - Urban sensing: out of the woods
Exploiting geometry for improved hybrid AOA/TDOA-based localization
Signal Processing
Location-Based Services: Back to the Future
IEEE Pervasive Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Connectivity-based localization of large-scale sensor networks with complex shape
ACM Transactions on Sensor Networks (TOSN)
On capacity of random wireless networks with physical-layer network coding
IEEE Journal on Selected Areas in Communications - Special issue on network coding for wireless communication networks
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
A survey on localization for mobile wireless sensor networks
MELT'09 Proceedings of the 2nd international conference on Mobile entity localization and tracking in GPS-less environments
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Implementation and evaluation of cooperative communication schemes in software-defined radio testbed
INFOCOM'10 Proceedings of the 29th conference on Information communications
Distributed source localization based on TOA measurements in wireless sensor networks
Research Letters in Signal Processing
The performance of network coding at the physical layer with imperfect self-information removal
EURASIP Journal on Wireless Communications and Networking - Special issue on physical-layer network coding for wireless cooperative networks
Challenges and business models for mobile location-based services and advertising
Communications of the ACM
A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques
IEEE Communications Surveys & Tutorials
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Previous research on physical layer network coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed in [1]. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many important issues to turn the idea into a practical approach are not extensively studied. In this paper, we plan to investigate these problems. Specifically, our research focuses on the bootstrap procedures, security, and localization accuracy of the PNC based mechanism. We first study the required node density to bootstrap the localization procedure in both infrastructure-based and self-organized networks. With this question answered, researchers can recognize the network scenarios to which PNC based localization can be applied. We design mechanisms to protect integrity of the exchanged information and defend against node impersonation attacks so that the localization procedures will be robust against malicious activities. For localization accuracy, we study the negative impacts of the position errors of the anchor nodes. We design two mechanisms to reduce the localization inaccuracy for both individual nodes and cumulative procedures through excluding the anchor nodes with positioning errors and introducing multiple bootstrap areas. Both simulation and theoretical analysis are used to support our investigation. This research shows that PNC based node localization can satisfy the security and accuracy requirements of different types of wireless networks and it can be widely deployed.