2021
DOI: 10.1109/jiot.2020.3036849
|View full text |Cite
|
Sign up to set email alerts
|

Secure Localization and Velocity Estimation in Mobile IoT Networks With Malicious Attacks

Abstract: Secure localization and velocity estimation are of great importance in Internet of Things (IoT) applications and are particularly challenging in the presence of malicious attacks. The problem becomes even more challenging in practical scenarios in which attack information is unknown and anchor node location uncertainties occur due to node mobility and falsification of malicious nodes. This challenging problem is investigated in this paper. With reasonable assumptions on the attack model and uncertainties, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 39 publications
(76 reference statements)
0
4
0
Order By: Relevance
“…A WLS-based algorithm was proposed also in [117], showing to be particularly effective in countering the impact of attackers who manipulate the transmission power of anchors. In the work [118], these threats were formulated as an intractable maximum a posteriori problem, considering a practical model of attack and uncertainties. The proposed algorithm iteratively approximates the true posterior distribution, providing closed-form estimates of position and velocity while identifying malicious nodes.…”
Section: Authenticitymentioning
confidence: 99%
“…A WLS-based algorithm was proposed also in [117], showing to be particularly effective in countering the impact of attackers who manipulate the transmission power of anchors. In the work [118], these threats were formulated as an intractable maximum a posteriori problem, considering a practical model of attack and uncertainties. The proposed algorithm iteratively approximates the true posterior distribution, providing closed-form estimates of position and velocity while identifying malicious nodes.…”
Section: Authenticitymentioning
confidence: 99%
“…A vibrational message passing algorithm is applied to check the network iteratively and find the closed convergence of attacks. The challenging problem is formulated with true posterior distribution on malicious nodes [13][14][15][16][17].…”
Section: Literature Surveymentioning
confidence: 99%
“…When a certain sensor node is compromised, the attackers can manipulate relevant information for dealing with the fundamental limitations presented in Section III such as the location of sensor nodes and measurements, which could lead to poor localization accuracy with unfortunate results. Although there are several works addressing the security in localization problems [230][231][232][233], they mostly assume ideal scenarios without considering the availability of reference nodes, MPCs, and NLOS conditions. In a similar way, most of the works that deal with fundamental limitations assume that all the sensor nodes provide reliable information, e.g, their position.…”
Section: Securitymentioning
confidence: 99%