메뉴 건너뛰기




Volumn , Issue , 2009, Pages 864-869

Secure localization and location verification in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

HOSTILE ENVIRONMENTS; LOCATION VERIFICATION; SECURE LOCALIZATION; STATE OF RESEARCH;

EID: 74249104852     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2009.5337043     Document Type: Conference Paper
Times cited : (14)

References (50)
  • 2
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of MobiCom, 2000.
    • (2000) Proceedings of MobiCom
    • Karp, B.1    Kung, H.T.2
  • 3
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks
    • D. Liu and P. Ning, "Location-based pairwise key establishments for static sensor networks," in Proceedings ofACM SASN, 2003.
    • (2003) Proceedings ofACM SASN
    • Liu, D.1    Ning, P.2
  • 6
    • 42649116160 scopus 로고    scopus 로고
    • Secure localization algorithms for wireless sensor networks
    • April
    • A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro, "Secure localization algorithms for wireless sensor networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 96-101, April 2008.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 96-101
    • Boukerche, A.1    Oliveira, H.2    Nakamura, E.3    Loureiro, A.4
  • 7
    • 48049111552 scopus 로고    scopus 로고
    • Guaranteeing the authenticity of location information
    • July-Sept
    • A.-T. Ferreres, B. Alvarez, and A. Garnacho, "Guaranteeing the authenticity of location information," IEEE Personal Commun. Mag., vol. 7, no. 3, pp. 72-80, July-Sept. 2008.
    • (2008) IEEE Personal Commun. Mag , vol.7 , Issue.3 , pp. 72-80
    • Ferreres, A.-T.1    Alvarez, B.2    Garnacho, A.3
  • 8
    • 0034775930 scopus 로고    scopus 로고
    • Dynamic fine-grained localization in ad-hoc networks of sensors
    • Rome,Italy
    • A. Savvides, C.-C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proceedings ofMobiCom, Rome,Italy, 2001.
    • (2001) Proceedings ofMobiCom
    • Savvides, A.1    Han, C.-C.2    Srivastava, M.3
  • 10
    • 0041973656 scopus 로고    scopus 로고
    • Ad hoc positioning system (aps) using aoa
    • San Francisco, CA, April
    • -, "Ad hoc positioning system (aps) using aoa," in Proceedings of INFOCOM, San Francisco, CA, April 2003.
    • (2003) Proceedings of INFOCOM
  • 12
    • 27644573932 scopus 로고    scopus 로고
    • Robust distributed network localization with noisy range measurements
    • D. Moore, J. Leonard, D. Rus, and S. Teller, "Robust distributed network localization with noisy range measurements," in Proceedings of SenSys, 2004.
    • (2004) Proceedings of SenSys
    • Moore, D.1    Leonard, J.2    Rus, D.3    Teller, S.4
  • 13
    • 85084163355 scopus 로고    scopus 로고
    • Robust positioning algorithms for distributed ad-hoc wireless sensor networks
    • C. Savarese and J. Rabay, "Robust positioning algorithms for distributed ad-hoc wireless sensor networks," in Proceedings of USENIX, 2002.
    • (2002) Proceedings of USENIX
    • Savarese, C.1    Rabay, J.2
  • 14
    • 0036983357 scopus 로고    scopus 로고
    • The bits and flops of the n-hop multilateration primitive for node localization problems
    • A. Savvides, H. Park, and M. B. Srivastava, "The bits and flops of the n-hop multilateration primitive for node localization problems," in Proceedings of WSNA, 2002, pp. 112-121.
    • (2002) Proceedings of WSNA , pp. 112-121
    • Savvides, A.1    Park, H.2    Srivastava, M.B.3
  • 15
    • 33748075474 scopus 로고    scopus 로고
    • Robust distributed node localization with error management
    • J. Liu, Y. Zhang, and F. Zhao, "Robust distributed node localization with error management," in Proceedings of Mobilloc, 2006, pp. 250-261.
    • (2006) Proceedings of Mobilloc , pp. 250-261
    • Liu, J.1    Zhang, Y.2    Zhao, F.3
  • 19
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proceedings of INFOCOM, 2003.
    • (2003) Proceedings of INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 20
    • 33144467903 scopus 로고    scopus 로고
    • Attack-resistant location estimation in sensor networks
    • D. Liu, P. Ning, and W. K. Du, "Attack-resistant location estimation in sensor networks," in Proceedings of IPSN, 2005.
    • (2005) Proceedings of IPSN
    • Liu, D.1    Ning, P.2    Du, W.K.3
  • 21
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proceedings of IPSN, 2005.
    • (2005) Proceedings of IPSN
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4
  • 22
    • 70349177807 scopus 로고    scopus 로고
    • Pollution attack: A new attack against localization in wireless sensor networks
    • Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Pollution attack: A new attack against localization in wireless sensor networks," in Proceedings of WCNC, 2009.
    • (2009) Proceedings of WCNC
    • Zeng, Y.1    Cao, J.2    Zhang, S.3    Guo, S.4    Xie, L.5
  • 23
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proceedings of ACM WiSe, 2004.
    • (2004) Proceedings of ACM WiSe
    • Lazos, L.1    Poovendran, R.2
  • 24
    • 33144475948 scopus 로고    scopus 로고
    • HiRLoc: High-resolution robust localization for wireless sensor networks
    • Feb
    • -, "HiRLoc: high-resolution robust localization for wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 233-246, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.2 , pp. 233-246
    • Lazos, L.1    Poovendran, R.2
  • 25
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proceedings of INFOCOM, 2005.
    • (2005) Proceedings of INFOCOM
    • Capkun, S.1    Hubaux, J.-P.2
  • 27
    • 33144472023 scopus 로고    scopus 로고
    • ROPE: Robust position estimation in wireless sensor networks
    • Piscataway, NJ, USA: IEEE Press
    • L. Lazos, R. Poovendran, and S. Čapkun, "ROPE: robust position estimation in wireless sensor networks," in Proceedings of IPSN. Piscataway, NJ, USA: IEEE Press, 2005, p. 43.
    • (2005) Proceedings of IPSN , pp. 43
    • Lazos, L.1    Poovendran, R.2    Čapkun, S.3
  • 28
    • 0012578409 scopus 로고
    • Distance-bounding protocols
    • Springer-Verlag
    • S. Brands and D. Chaum, "Distance-bounding protocols," in Proceedings of EUROCRYPT. Springer-Verlag, 1993, pp. 344-359.
    • (1993) Proceedings of EUROCRYPT , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 29
    • 48349098629 scopus 로고    scopus 로고
    • Secure hop-count based localization in wireless sensor networks
    • Y. Zeng, S. Zhang, S. Guo, and X. Li, "Secure hop-count based localization in wireless sensor networks," in Proceedings of CIS, 2007.
    • (2007) Proceedings of CIS
    • Zeng, Y.1    Zhang, S.2    Guo, S.3    Li, X.4
  • 30
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proceedings of ICDCS, 2005.
    • (2005) Proceedings of ICDCS
    • Liu, D.1    Ning, P.2    Du, W.3
  • 32
    • 36949013183 scopus 로고    scopus 로고
    • Drbts: Distributed reputation-based beacon trust system
    • Oct
    • A. Srinivasan, J. Teitelbaum, and J. Wu, "Drbts: Distributed reputation-based beacon trust system," in Proceedings of DASC, Oct. 2006, pp. 277-283.
    • (2006) Proceedings of DASC , pp. 277-283
    • Srinivasan, A.1    Teitelbaum, J.2    Wu, J.3
  • 33
    • 49449086367 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du, "Attack-resistant location estimation in wireless sensor networks," TISSEC, vol. 11, no. 4, pp. 1-39,2008.
    • (2008) TISSEC , vol.11 , Issue.4 , pp. 1-39
    • Liu, D.1    Ning, P.2    Liu, A.3    Wang, C.4    Du, W.K.5
  • 34
    • 35148872660 scopus 로고    scopus 로고
    • ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment
    • S. Misra, S. Bhardwaj, and G. Xue, "ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment," in Proceedings of MILCOM 2006, 2006.
    • (2006) Proceedings of MILCOM 2006
    • Misra, S.1    Bhardwaj, S.2    Xue, G.3
  • 36
    • 70349169526 scopus 로고    scopus 로고
    • Anti-collusion position estimation inwireless sensor networks
    • N. Kiyavash and F. Koushanfar, "Anti-collusion position estimation inwireless sensor networks," in Proceedings of MASS, 2007.
    • (2007) Proceedings of MASS
    • Kiyavash, N.1    Koushanfar, F.2
  • 39
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • April
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 4, pp. 829-835, April 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 40
    • 74249106084 scopus 로고    scopus 로고
    • F. Anjum, S. Pandey, and P. Agrawal, Secure localization in sensor networks using transmission range variation, in Proceedings of MASS, Nov. 2005, pp. 9 pp.-203.
    • F. Anjum, S. Pandey, and P. Agrawal, "Secure localization in sensor networks using transmission range variation," in Proceedings of MASS, Nov. 2005, pp. 9 pp.-203.
  • 41
  • 43
    • 33746313270 scopus 로고    scopus 로고
    • LAD: Localization anomaly detection forwireless sensor networks
    • April
    • W. Du, L. Fang, and P. Ning, "LAD: Localization anomaly detection forwireless sensor networks," in Proceedings of IPDPS, April 2005, pp. 41a-41a.
    • (2005) Proceedings of IPDPS
    • Du, W.1    Fang, L.2    Ning, P.3
  • 44
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • T. Leinmuller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Communications, vol. 13, no. 5, pp. 16-21,2006.
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 16-21
    • Leinmuller, T.1    Schoch, E.2    Kargl, F.3
  • 45
    • 42549116750 scopus 로고    scopus 로고
    • A probabilistic approach to location verification in wireless sensor networks
    • June
    • E. Ekici, J. Mcnair, and D. Al-Abri, "A probabilistic approach to location verification in wireless sensor networks," in Proceedings of ICC, vol. 8, June 2006, pp. 3485-3490.
    • (2006) Proceedings of ICC , vol.8 , pp. 3485-3490
    • Ekici, E.1    Mcnair, J.2    Al-Abri, D.3
  • 46
    • 35548948372 scopus 로고    scopus 로고
    • Secure probabilistic location verification in randomly deployed wireless sensor networks
    • E. Ekici, S. Vural, J. McNair, and D. Al-Abri, "Secure probabilistic location verification in randomly deployed wireless sensor networks," Ad Hoc Networks, vol. 6, no. 2, pp. 195 - 209, 2008.
    • (2008) Ad Hoc Networks , vol.6 , Issue.2 , pp. 195-209
    • Ekici, E.1    Vural, S.2    McNair, J.3    Al-Abri, D.4
  • 47
    • 34548329877 scopus 로고    scopus 로고
    • Detecting phantom nodes in wireless sensor networks
    • May
    • J. Hwang, T. He, and Y. Kim, "Detecting phantom nodes in wireless sensor networks," in Proceedings of INFOCOM, May 2007, pp. 2391-2395.
    • (2007) Proceedings of INFOCOM , pp. 2391-2395
    • Hwang, J.1    He, T.2    Kim, Y.3
  • 48
    • 34848819422 scopus 로고    scopus 로고
    • Location verification algorithms for wireless sensor networks
    • June
    • Y. Wei, Z. Yu, and Y. Guan, "Location verification algorithms for wireless sensor networks," in Proceedings of ICDCS, June 2007, pp. 70-70.
    • (2007) Proceedings of ICDCS , pp. 70-70
    • Wei, Y.1    Yu, Z.2    Guan, Y.3
  • 49
    • 74249112919 scopus 로고    scopus 로고
    • SecMCL: A secure monte carlo localization algorithm for mobile sensor networks
    • Y. Zeng, J. Cao, J. Hong, S. Zhang, and L. Xie, "SecMCL: A secure monte carlo localization algorithm for mobile sensor networks," in accepted by WSNS, 2009.
    • (2009) accepted by WSNS
    • Zeng, Y.1    Cao, J.2    Hong, J.3    Zhang, S.4    Xie, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.