GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A directionality based location discovery scheme for wireless sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
The bits and flops of the n-hop multilateration primitive for node localization problems
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Cooperative Location-Sensing for Wireless Networks
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Organizing a global coordinate system from local information on an ad hoc sensor network
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Thunder: towards practical, zero cost acoustic localization for outdoor wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Sensor node compromise detection: the location perspective
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Analysis of range-free anchor-free localization in a wsn under wormhole attack
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On extracting consistent graphs in wireless sensor networks
International Journal of Sensor Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Sensor Networks (TOSN)
Secure localization with phantom node detection
Ad Hoc Networks
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
Wireless Personal Communications: An International Journal
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Pollution attack: a new attack against localization in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
ACC'09 Proceedings of the 2009 conference on American Control Conference
International Journal of Systems, Control and Communications
Robust wireless localization to attacks on access points
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Tolerant majority-colluding attacks for secure localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Beyond triangle inequality: sifting noisy and outlier distance measurements for localization
INFOCOM'10 Proceedings of the 29th conference on Information communications
Location discovery in Wireless Sensor Networks using metaheuristics
Applied Soft Computing
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
A novel secure localization approach in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
COTA: a robust multi-hop localization scheme in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Toward attack-resistant localization under infrastructure attacks
Security and Communication Networks
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Robust localization against outliers in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization
ACM Transactions on Sensor Networks (TOSN)
Towards statistically strong source anonymity for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations
Computers and Electrical Engineering
Hi-index | 0.00 |
Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks. The first method filters out malicious beacon signals on the basis of the "consistency" among multiple beacon signals, while the second method tolerates malicious beacon signals by adopting an iteratively refined voting scheme. Both methods can survive malicious attacks even if the attacks bypass authentication, provided that the benign beacon signals constitute the majority of the "consistent" beacon signals. This paper also presents the implementation of these techniques on MICA2 motes running TinyOS, and the evaluation through both simulation and field experiments. The experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.