Practical methods of optimization; (2nd ed.)
Practical methods of optimization; (2nd ed.)
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
The bits and flops of the n-hop multilateration primitive for node localization problems
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Localization from mere connectivity
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Distributed localization in wireless sensor networks: a quantitative comparison
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Robust distributed network localization with noisy range measurements
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Robust distributed node localization with error management
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Localization in sparse networks using sweeps
Proceedings of the 12th annual international conference on Mobile computing and networking
DRBTS: Distributed Reputation-based Beacon Trust System
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Secure Location Verification Using Radio Broadcast
IEEE Transactions on Dependable and Secure Computing
Wireless sensor network localization techniques
Computer Networks: The International Journal of Computer and Telecommunications Networking
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Location Verification Algorithms forWireless Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Secure Hop-Count Based Localization in Wireless Sensor Networks
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
Secure Location Verification with Hidden and Mobile Base Stations
IEEE Transactions on Mobile Computing
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Guaranteeing the Authenticity of Location Information
IEEE Pervasive Computing
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Pollution attack: a new attack against localization in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Beyond triangle inequality: sifting noisy and outlier distance measurements for localization
INFOCOM'10 Proceedings of the 29th conference on Information communications
ROSETTA: robust and secure mobile target tracking in a wireless ad hoc environment
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
IEEE Wireless Communications
Secure localization algorithms for wireless sensor networks
IEEE Communications Magazine
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
HiRLoc: high-resolution robust localization for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Secure localization and authentication in ultra-wideband sensor networks
IEEE Journal on Selected Areas in Communications - Part 1
Sensor Localization under Limited Measurement Capabilities
IEEE Network: The Magazine of Global Internetworking
Trust, security and privacy for pervasive applications
The Journal of Supercomputing
Location error estimation in wireless ad hoc networks
Ad Hoc Networks
Hi-index | 0.00 |
The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.