Secure Location Verification Using Radio Broadcast
IEEE Transactions on Dependable and Secure Computing
Enabling location and environment awareness in cognitive radios
Computer Communications
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
On the impact of localization data in wireless sensor networks with malicious nodes
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Pollution attack: a new attack against localization in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Effectiveness of distance-decreasing attacks against impulse radio ranging
Proceedings of the third ACM conference on Wireless network security
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Sequential protocol composition in maude-NPA
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
ROSETTA: robust and secure mobile target tracking in a wireless ad hoc environment
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
A localization game in wireless sensor networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Indoor localisation robustness and performance improvement
International Journal of Communication Networks and Distributed Systems
Massively parallel cooperative localisation in scalable sensor networks
International Journal of Communication Networks and Distributed Systems
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Secure localization using dynamic verifiers
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Robustness against Byzantine Failures in Distributed Spectrum Sensing
Computer Communications
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Sensor Networks
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Secure and resilient proximity-based access control
Proceedings of the 2013 international workshop on Data management & analytics for healthcare
Expert Systems with Applications: An International Journal
Eliminating rouge femtocells based on distance bounding protocol and geographic information
Expert Systems with Applications: An International Journal
Hi-index | 0.08 |
So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.