A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
On the performance of ad hoc networks with beamforming antennas
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Localization from mere connectivity
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
GPS-Free Positioning in Mobile ad-hoc Networks
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
Self-configuring localization systems
Self-configuring localization systems
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Poster abstract: anchor-free distributed localization in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
Organizing a global coordinate system from local information on an ad hoc sensor network
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A Wireless Sensor Network for Real-Time Indoor Localisation and Motion Monitoring
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Sensor Networks (TOSN)
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
On the robustness of range-free localization in wireless sensor networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
Wireless Personal Communications: An International Journal
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Elliptical anomalies in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Tolerant majority-colluding attacks for secure localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Intrusion detection of sinkhole attacks in wireless sensor networks
ALGOSENSORS'07 Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
On accuracy of region based localization algorithms for wireless sensor networks
Computer Communications
Minimizing energy consumption with probabilistic distance models in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Location discovery in Wireless Sensor Networks using metaheuristics
Applied Soft Computing
Computers and Electrical Engineering
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
A novel secure localization approach in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Massively parallel cooperative localisation in scalable sensor networks
International Journal of Communication Networks and Distributed Systems
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
RETRACTED: Impacts of sensor node distributions on coverage in sensor networks
Journal of Parallel and Distributed Computing
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
Wireless sensor node localization by multisequence processing
ACM Transactions on Embedded Computing Systems (TECS)
Node capture games: a game theoretic approach to modeling and mitigating node capture attacks
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Sybil attack detection through global topology pattern visualization
Information Visualization
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
Self-organised localisation in indoor environments using the ALF framework
International Journal of Communication Networks and Distributed Systems
Location estimation for wireless sensor networks with attack tolerance
International Journal of Wireless and Mobile Computing
Eliminating rouge femtocells based on distance bounding protocol and geographic information
Expert Systems with Applications: An International Journal
Journal of Computer and System Sciences
Taxonomy of Fundamental Concepts of Localization in Cyber-Physical and Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
Many distributed monitoring applications of Wireless Sensor Networks (WSNs) require the location information of a sensor node. In this article, we address the problem of enabling nodes of Wireless Sensor Networks to determine their location in an untrusted environment, known as the secure localization problem. We propose a novel range-independent localization algorithm called SeRLoc that is well suited to a resource constrained environment such as a WSN. SeRLoc is a distributed algorithm based on a two-tier network architecture that allows sensors to passively determine their location without interacting with other sensors. We show that SeRLoc is robust against known attacks on a WSNs such as the wormhole attack, the Sybil attack, and compromise of network entities and analytically compute the probability of success for each attack. We also compare the performance of SeRLoc with state-of-the-art range-independent localization schemes and show that SeRLoc has better performance.