Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
DOI: 10.1109/infcom.2005.1498470
|View full text |Cite
|
Sign up to set email alerts
|

Secure positioning of wireless devices with application to sensor networks

Abstract: Abstract-So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
309
0

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 343 publications
(309 citation statements)
references
References 32 publications
(35 reference statements)
0
309
0
Order By: Relevance
“…Sastry et al [18] presented an early version of a protocol that verifies node locations and bases node identities on their location information. Similar ideas were also proposed by Waters and Felten [20], Bazzi and Konjevod [2] andČapkun and Hubaux [4,5]. In the most general form, these works are based on measuring the delays incurred by communications between nodes and imposing a geometric structure on the "distance space" to determine node locations.…”
Section: Existing Workmentioning
confidence: 93%
“…Sastry et al [18] presented an early version of a protocol that verifies node locations and bases node identities on their location information. Similar ideas were also proposed by Waters and Felten [20], Bazzi and Konjevod [2] andČapkun and Hubaux [4,5]. In the most general form, these works are based on measuring the delays incurred by communications between nodes and imposing a geometric structure on the "distance space" to determine node locations.…”
Section: Existing Workmentioning
confidence: 93%
“…These are typically based on verifying whether estimates of the same parameter are sufficiently close [74], [75], [76] and/or consistent with prior knowledge [77]. Most such approaches are well-suited for sensors that measure a scalar quantity such as temperature or pressure.…”
Section: B Refining the Calibrationmentioning
confidence: 99%
“…A robust localization algorithm delivers correct location estimates even in the presence of well-defined, accidental failures. Another aspect is secure verification of location estimates, where spoofed locations can be detected (see, e.g., [4]). …”
Section: Other Quality-of-service Aspectsmentioning
confidence: 99%