Robust regression and outlier detection
Robust regression and outlier detection
The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
The bits and flops of the n-hop multilateration primitive for node localization problems
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Mobile robot localization by remote viewing of a colored cylinder
IROS '95 Proceedings of the International Conference on Intelligent Robots and Systems-Volume 1 - Volume 1
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Distributed localization in wireless sensor networks: a quantitative comparison
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Wireless Communications
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
RANBAR: RANSAC-based resilient aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A low-cost robust localization scheme for WLAN
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Thunder: towards practical, zero cost acoustic localization for outdoor wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
IEEE Pervasive Computing
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure localization with phantom node detection
Ad Hoc Networks
Redpin - adaptive, zero-configuration indoor localization through user collaboration
Proceedings of the first ACM international workshop on Mobile entity localization and tracking in GPS-less environments
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Localization and routing in sensor networks by local angle information
ACM Transactions on Sensor Networks (TOSN)
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
Wireless Personal Communications: An International Journal
Pollution attack: a new attack against localization in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
ACC'09 Proceedings of the 2009 conference on American Control Conference
International Journal of Systems, Control and Communications
Robust wireless localization to attacks on access points
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Tolerant majority-colluding attacks for secure localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Collaborative location certification for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Genetic algorithm based routing method for efficient data transmission in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Bilateration: an attack-resistant localization algorithm of wireless sensor network
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
A novel non-iterative localization solution
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Robust maximum likelihood acoustic source localization in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The directional attack on wireless localization: how to spoof your location with a tin can
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Performing joint learning for passive intrusion detection in pervasive wireless environments
INFOCOM'10 Proceedings of the 29th conference on Information communications
Beyond triangle inequality: sifting noisy and outlier distance measurements for localization
INFOCOM'10 Proceedings of the 29th conference on Information communications
A framework for low complexity least-squares localization with high accuracy
IEEE Transactions on Signal Processing
Locating sensors in the wild: pursuit of ranging quality
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
ROSETTA: robust and secure mobile target tracking in a wireless ad hoc environment
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Hybrid RSS-RTT localization scheme for indoor wireless networks
EURASIP Journal on Advances in Signal Processing
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
An analysis of node localization error behavior in wireless sensor networks
ICIRA'10 Proceedings of the Third international conference on Intelligent robotics and applications - Volume Part I
A novel secure localization approach in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Indoor localisation robustness and performance improvement
International Journal of Communication Networks and Distributed Systems
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
Robust detection of primary user emulation attacks in IEEE 802.22 networks
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
COTA: a robust multi-hop localization scheme in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Toward attack-resistant localization under infrastructure attacks
Security and Communication Networks
Fundamental limits and improved algorithms for linear least-squares wireless position estimation
Wireless Communications & Mobile Computing
Robust localization against outliers in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization
ACM Transactions on Sensor Networks (TOSN)
Wireless Personal Communications: An International Journal
Location estimation for wireless sensor networks with attack tolerance
International Journal of Wireless and Mobile Computing
Localization of wireless sensor networks in the wild: pursuit of ranging quality
IEEE/ACM Transactions on Networking (TON)
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations
Computers and Electrical Engineering
An efficient non-line-of-sight error mitigation method for TOA measurement in indoor environments
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
A Non-Line-of-Sight mitigation localization algorithm for sensor networks using clustering analysis
Computers and Electrical Engineering
Hi-index | 0.00 |
Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to alter the underlying localization algorithms to be robust to intentionally corrupted measurements. In this paper, we develop robust statistical methods to make localization attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulation-based localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. Finally, we evaluate our robust localization schemes under different threat conditions.