The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2010 Eleventh International Conference on Mobile Data Management 2010
DOI: 10.1109/mdm.2010.75
|View full text |Cite
|
Sign up to set email alerts
|

Defending Wireless Sensor Networks against Adversarial Localization

Abstract: In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Solutions are limited to transmission power of nodes that make the adversary hard to detect. Proposed solutions are silencing through anti-localisation [38], context aware location privacy [39], hidden anchor [40], minimal radio transmission power [41] and multi co-operator power control [42].…”
Section: (Viii) Limiting Node Detectabilitymentioning
confidence: 99%
“…Solutions are limited to transmission power of nodes that make the adversary hard to detect. Proposed solutions are silencing through anti-localisation [38], context aware location privacy [39], hidden anchor [40], minimal radio transmission power [41] and multi co-operator power control [42].…”
Section: (Viii) Limiting Node Detectabilitymentioning
confidence: 99%
“…Some schemes will actively monitor whether attackers exist in the network and take corresponding measures to protect the location privacy of the source nodes. In the lightweight and distributed protocol against adversarial localization scheme [23], the network is divided into multiple grids. If an attacker is found in a grid, all sensor nodes in that grid become silent.…”
Section: A Slp Schemes Without Using Ringmentioning
confidence: 99%
“…An example solution against global attackers is the use of Network Coding [7] which have the disadvantage of increasing complexity in the sensing nodes. Most of the solutions proposed defend the network against local adversaries using techniques such as random walk [8], cyclic entrapment [9], delaying the packet [10] or limiting node detectability [3,11]. Some other techniques are able to defend the network against local or global adversaries utilizing implementation dependent approaches (e.g., use of dummy packets [8]).…”
Section: Related Workmentioning
confidence: 99%
“…Another prominent study in this class is by Dutta et al [11] where it is considered that the attackers measure raw physical properties of messages like angle of arrival or the signal strength of the detected signal. In order to defend against this kind of attackers, they propose anti-localization by silencing in which sensors intelligently predict their own importance as a measure of two conflicting requirements: localize the adversary and hide from the adversary.…”
Section: Related Workmentioning
confidence: 99%