Secure localization and location verification in wireless sensor networks: a survey

  • Authors:
  • Yingpei Zeng;Jiannong Cao;Jue Hong;Shigeng Zhang;Li Xie

  • Affiliations:
  • State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China 210093;Department of Computing, Hong Kong Polytechnic University, Hong Kong, P.R. China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China 210093;Department of Computer Science, Central South University, Changsha, P.R. China 410083;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.R. China 210093

  • Venue:
  • The Journal of Supercomputing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.