EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
GPS-Free Positioning in Mobile ad-hoc Networks
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A low-cost robust localization scheme for WLAN
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Underground structure monitoring with wireless sensor networks
Proceedings of the 6th international conference on Information processing in sensor networks
SecNav: secure broadcast localization and time synchronization in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure localization with phantom node detection
Ad Hoc Networks
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
On the interaction between localization and location verification for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Underground coal mine monitoring with wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
On the robustness of range-free localization in wireless sensor networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Some research questions for computational transportation science
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
Wireless Personal Communications: An International Journal
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Anchor-based localization via interval analysis for mobile ad-hoc sensor networks
IEEE Transactions on Signal Processing
Tolerant majority-colluding attacks for secure localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A stream-data oriented secure routing protocol in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
ROSETTA: robust and secure mobile target tracking in a wireless ad hoc environment
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A novel secure localization approach in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
VLOCI2: improving 2D location coordinates using distance measurements in GPS-equipped VANETs
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Finding lower bounds of localization with noisy measurements using genetic algorithms
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Data authenticity and availability in multihop wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Location estimation for wireless sensor networks with attack tolerance
International Journal of Wireless and Mobile Computing
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Eliminating rouge femtocells based on distance bounding protocol and geographic information
Expert Systems with Applications: An International Journal
Hi-index | 0.01 |
We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verification, in Wireless Sensor Networks (WSN). We propose a robust positioning system we call ROPE that allows sensors to determine their location without any centralized computation. In addition, ROPE provides a location verification mechanism that verifies the location claims of the sensors before data collection. We show that ROPE bounds the ability of an attacker to spoof sensors' locations, with relatively low density deployment of reference points. We confirm the robustness of ROPE against attacks analytically and via simulations.