An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Proactive attacker localization in wireless LAN
ACM SIGCOMM Computer Communication Review
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A hybrid positioning system for technology-independent location-aware computing
Software—Practice & Experience
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
Wireless Personal Communications: An International Journal
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Effectiveness of distance-decreasing attacks against impulse radio ranging
Proceedings of the third ACM conference on Wireless network security
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Formation coordination for self-mobile localization: framework
CIRA'09 Proceedings of the 8th IEEE international conference on Computational intelligence in robotics and automation
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Modeling and transceiver design for asymmetric UWB links with heterogeneous nodes
IEEE Transactions on Communications
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
MANET localization via multi-node TOA-DOA optimal fusion
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Position-based quantum cryptography: impossibility and constructions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Localization in presence of multipath effect in wireless sensor networks
WWIC'12 Proceedings of the 10th international conference on Wired/Wireless Internet Communication
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Location estimation for wireless sensor networks with attack tolerance
International Journal of Wireless and Mobile Computing
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Hi-index | 0.00 |
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the important application areas of UWB is wireless sensor networks. The proper operations of many UWB sensor networks rely on the knowledge of physical sensor locations. However, most existing localization algorithms developed for sensor networks are vulnerable to attacks in hostile environments. As a result, attackers can easily subvert the normal functionalities of location-dependent sensor networks by exploiting the weakness of localization algorithms. In this paper, we first analyze the security of existing localization techniques. We then develop a mobility-assisted secure localization scheme for UWB sensor networks. In addition, we propose a location-based scheme to enable secure authentication in UWB sensor networks.