메뉴 건너뛰기




Volumn 64, Issue 3, 2013, Pages 685-701

Secure localization and location verification in wireless sensor networks: A survey

Author keywords

Computer network security; Location verification; Secure localization; Wireless sensor networks

Indexed keywords

HOSTILE ENVIRONMENTS; LOCATION VERIFICATION; SECURE LOCALIZATION; WIRELESS SENSOR NETWORK (WSNS);

EID: 84886728890     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-010-0501-4     Document Type: Article
Times cited : (77)

References (62)
  • 3
    • 33750303903 scopus 로고    scopus 로고
    • Secure localization in sensor networks using transmission range variation
    • Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: Proceedings of MASS
    • (2005) Proceedings of MASS
    • Anjum, F.1    Pandey, S.2    Agrawal, P.3
  • 5
    • 42649116160 scopus 로고    scopus 로고
    • Secure localization algorithms for wireless sensor networks
    • 10.1109/MCOM.2008.4481347
    • Boukerche A, Oliveira H, Nakamura E, Loureiro A (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96-101
    • (2008) IEEE Commun Mag , vol.46 , Issue.4 , pp. 96-101
    • Boukerche, A.1    Oliveira, H.2    Nakamura, E.3    Loureiro, A.4
  • 7
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings of INFOCOM
    • (2005) Proceedings of INFOCOM
    • Capkun, S.1    Hubaux, J.P.2
  • 8
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • doi: 10.1109/JSAC.2005.861380
    • Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun. doi: 10.1109/JSAC.2005.861380
    • (2006) IEEE J Sel Areas Commun.
    • Capkun, S.1    Hubaux, J.P.2
  • 10
    • 39749096536 scopus 로고    scopus 로고
    • Secure location verification with hidden and mobile base stations
    • 10.1109/TMC.2007.70782
    • Capkun S, Rasmussen K, Cagalj M, Srivastava M (2008) Secure location verification with hidden and mobile base stations. IEEE Trans Mobile Comput 7(4):470-483
    • (2008) IEEE Trans Mobile Comput , vol.7 , Issue.4 , pp. 470-483
    • Capkun, S.1    Rasmussen, K.2    Cagalj, M.3    Srivastava, M.4
  • 12
    • 33746313270 scopus 로고    scopus 로고
    • LAD: Localization anomaly detection forwireless sensor networks
    • Du W, Fang L, Ning P (2005) LAD: Localization anomaly detection forwireless sensor networks. In: Proceedings of IPDPS
    • (2005) Proceedings of IPDPS
    • Du, W.1    Fang, L.2    Ning, P.3
  • 13
    • 42549116750 scopus 로고    scopus 로고
    • A probabilistic approach to location verification in wireless sensor networks
    • Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: Proceedings of ICC
    • (2006) Proceedings of ICC
    • Ekici, E.1    McNair, J.2    Al-Abri, D.3
  • 14
    • 35548948372 scopus 로고    scopus 로고
    • Secure probabilistic location verification in randomly deployed wireless sensor networks
    • 10.1016/j.adhoc.2006.11.006
    • Ekici E, Vural S, McNair J, Al-Abri D (2008) Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw 6(2):195-209
    • (2008) Ad Hoc Netw , vol.6 , Issue.2 , pp. 195-209
    • Ekici, E.1    Vural, S.2    McNair, J.3    Al-Abri, D.4
  • 19
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • 10.1109/TPDS.2008.166
    • He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050-1058
    • (2009) IEEE Trans Parallel Distrib Syst , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 20
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Hu Y, Perrig A, Johnson D (2003) Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM
    • (2003) Proceedings of INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 21
    • 34548329877 scopus 로고    scopus 로고
    • Detecting phantom nodes in wireless sensor networks
    • Hwang J, He T, Kim Y (2007) Detecting phantom nodes in wireless sensor networks. In: Proceedings of INFOCOM
    • (2007) Proceedings of INFOCOM
    • Hwang, J.1    He, T.2    Kim, Y.3
  • 22
    • 77953295176 scopus 로고    scopus 로고
    • Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization
    • Jian L, Yang Z, Liu Y (2010) Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization. In: Proceedings of INFOCOM
    • (2010) Proceedings of INFOCOM
    • Jian, L.1    Yang, Z.2    Liu, Y.3
  • 23
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of MobiCom
    • (2000) Proceedings of MobiCom
    • Karp, B.1    Kung, H.T.2
  • 25
    • 70349169526 scopus 로고    scopus 로고
    • Anti-collusion position estimation in wireless sensor networks
    • Kiyavash N, Koushanfar F (2007) Anti-collusion position estimation in wireless sensor networks. In: Proceedings of MASS
    • (2007) Proceedings of MASS
    • Kiyavash, N.1    Koushanfar, F.2
  • 26
    • 0141509888 scopus 로고    scopus 로고
    • Distributed localization in wireless sensor networks: A quantitative comparison
    • 1069.68653 10.1016/S1389-1286(03)00356-6
    • Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Netw 43(4):499-518
    • (2003) Comput Netw , vol.43 , Issue.4 , pp. 499-518
    • Langendoen, K.1    Reijers, N.2
  • 27
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of ACM WiSe
    • (2004) Proceedings of ACM WiSe
    • Lazos, L.1    Poovendran, R.2
  • 28
    • 33144475948 scopus 로고    scopus 로고
    • HiRLoc: High-resolution robust localization for wireless sensor networks
    • 10.1109/JSAC.2005.861381
    • Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233-246
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.2 , pp. 233-246
    • Lazos, L.1    Poovendran, R.2
  • 30
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • 10.1109/WC-M.2006.250353
    • Leinmuller T, Schoch E, Kargl F (2006) Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun 13(5):16-21
    • (2006) IEEE Wirel Commun , vol.13 , Issue.5 , pp. 16-21
    • Leinmuller, T.1    Schoch, E.2    Kargl, F.3
  • 31
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of IPSN
    • (2005) Proceedings of IPSN
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4
  • 32
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks
    • Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM SASN
    • (2003) Proceedings of ACM SASN
    • Liu, D.1    Ning, P.2
  • 33
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • Liu D, Ning P, Du W (2005) Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proceedings of ICDCS
    • (2005) Proceedings of ICDCS
    • Liu, D.1    Ning, P.2    Du, W.3
  • 34
    • 33144467903 scopus 로고    scopus 로고
    • Attack-resistant location estimation in sensor networks
    • Liu D, Ning P, Du WK (2005) Attack-resistant location estimation in sensor networks. In: Proceedings of IPSN
    • (2005) Proceedings of IPSN
    • Liu, D.1    Ning, P.2    Du, W.K.3
  • 35
    • 49449086367 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • 1176.49013 10.1145/1380564.1380570
    • Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1-39
    • (2008) ACM Trans Inf Syst Secur , vol.11 , Issue.4 , pp. 1-39
    • Liu, D.1    Ning, P.2    Liu, A.3    Wang, C.4    Du, W.K.5
  • 36
    • 49149087835 scopus 로고    scopus 로고
    • Robust distributed node localization with error management
    • Liu J, Zhang Y, Zhao F (2006) Robust distributed node localization with error management. In: Proceedings of MobiHoc
    • (2006) Proceedings of MobiHoc
    • Liu, J.1    Zhang, Y.2    Zhao, F.3
  • 37
    • 34247885928 scopus 로고    scopus 로고
    • Wireless sensor network localization techniques
    • 1120.68021 10.1016/j.comnet.2006.11.018
    • Mao G, Fidan B, Anderson BDO (2007) Wireless sensor network localization techniques. Comput Netw 51(10):2529-2553
    • (2007) Comput Netw , vol.51 , Issue.10 , pp. 2529-2553
    • Mao, G.1    Fidan, B.2    Anderson, B.D.O.3
  • 38
    • 35148872660 scopus 로고    scopus 로고
    • ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment
    • Misra S, Bhardwaj S, Xue G (2006) ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment. In: Proceedings of MILCOM
    • (2006) Proceedings of MILCOM
    • Misra, S.1    Bhardwaj, S.2    Xue, G.3
  • 39
    • 64049093544 scopus 로고    scopus 로고
    • Secure and robust localization in a wireless ad hoc environment
    • 10.1109/TVT.2008.926616
    • Misra S, Xue G, Bhardwaj S (2009) Secure and robust localization in a wireless ad hoc environment. IEEE Trans Veh Technol 58(3):1480-1489
    • (2009) IEEE Trans Veh Technol , vol.58 , Issue.3 , pp. 1480-1489
    • Misra, S.1    Xue, G.2    Bhardwaj, S.3
  • 40
  • 45
    • 85084163355 scopus 로고    scopus 로고
    • Robust positioning algorithms for distributed ad-hoc wireless sensor networks
    • Savarese C, Rabay J (2002) Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In: Proceedings of USENIX
    • (2002) Proceedings of USENIX
    • Savarese, C.1    Rabay, J.2
  • 47
    • 0036983357 scopus 로고    scopus 로고
    • The bits and flops of the n-hop multilateration primitive for node localization problems
    • Savvides A, Park H, Srivastava MB (2002) The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of WSNA
    • (2002) Proceedings of WSNA
    • Savvides, A.1    Park, H.2    Srivastava, M.B.3
  • 50
    • 57549096410 scopus 로고    scopus 로고
    • A survey on secure localization in wireless sensor networks
    • B. Furht (eds) CRC Press Boca Raton
    • Srinivasan A, Wu J (2008) A survey on secure localization in wireless sensor networks. In: Furht B (ed) Encyclopedia of wireless and mobile communications. CRC Press, Boca Raton
    • (2008) Encyclopedia of Wireless and Mobile Communications
    • Srinivasan, A.1    Wu, J.2
  • 51
    • 70350741999 scopus 로고    scopus 로고
    • Distributed reputation-based secure localization in sensor networks
    • Srinivasan A, Wu J, Teitelbaum J (2007) Distributed reputation-based secure localization in sensor networks. J Auton Trusted Comput. http://www.cis.temple.edu/~wu/DRBTS-JournalVersion-JoATC.pdf
    • (2007) J Auton Trusted Comput
    • Srinivasan, A.1    Wu, J.2    Teitelbaum, J.3
  • 52
    • 33751507355 scopus 로고    scopus 로고
    • Secure location verification using radio broadcast
    • 10.1109/TDSC.2006.57
    • Vora A, Nesterenko M (2006) Secure location verification using radio broadcast. IEEE Trans Depend Secure Comput 3(4):377-385
    • (2006) IEEE Trans Depend Secure Comput , vol.3 , Issue.4 , pp. 377-385
    • Vora, A.1    Nesterenko, M.2
  • 54
    • 34249800081 scopus 로고    scopus 로고
    • Sensor localization under limited measurement capabilities
    • 10.1109/MNET.2007.364254
    • Wang C, Xiao L (2007) Sensor localization under limited measurement capabilities. IEEE Netw 21(3):16-23
    • (2007) IEEE Netw , vol.21 , Issue.3 , pp. 16-23
    • Wang, C.1    Xiao, L.2
  • 55
    • 34848819422 scopus 로고    scopus 로고
    • Location verification algorithms for wireless sensor networks
    • Wei Y, Yu Z, Guan Y (2007) Location verification algorithms for wireless sensor networks. In: Proceedings of ICDCS
    • (2007) Proceedings of ICDCS
    • Wei, Y.1    Yu, Z.2    Guan, Y.3
  • 56
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc
    • (2005) Proceedings of MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 57
    • 48349098629 scopus 로고    scopus 로고
    • Secure hop-count based localization in wireless sensor networks
    • Zeng Y, Zhang S, Guo S, Li X (2007) Secure hop-count based localization in wireless sensor networks. In: Proceedings of CIS
    • (2007) Proceedings of CIS
    • Zeng, Y.1    Zhang, S.2    Guo, S.3    Li, X.4
  • 58
    • 84886725134 scopus 로고    scopus 로고
    • Secure localization and location verification in wireless sensor networks
    • Zeng Y, Cao J, Hong J, Xie L (2009) Secure localization and location verification in wireless sensor networks. In: Proceedings of TSP
    • (2009) Proceedings of TSP
    • Zeng, Y.1    Cao, J.2    Hong, J.3    Xie, L.4
  • 59
    • 84886722193 scopus 로고    scopus 로고
    • SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks
    • Zeng Y, Cao J, Hong J, Zhang S, Xie L (2009) SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks. In: Proceedings of WSNS
    • (2009) Proceedings of WSNS
    • Zeng, Y.1    Cao, J.2    Hong, J.3    Zhang, S.4    Xie, L.5
  • 60
    • 70349177807 scopus 로고    scopus 로고
    • Pollution attack: A new attack against localization in wireless sensor networks
    • Zeng Y, Cao J, Zhang S, Guo S, Xie L (2009) Pollution attack: a new attack against localization in wireless sensor networks. In: Proceedings of WCNC
    • (2009) Proceedings of WCNC
    • Zeng, Y.1    Cao, J.2    Zhang, S.3    Guo, S.4    Xie, L.5
  • 61
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • 10.1109/JSAC.2005.863855
    • Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829-835
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.