scispace - formally typeset
Proceedings ArticleDOI

SeRLoc: secure range-independent localization for wireless sensor networks

TLDR
This is the first work that provides a security-aware range-independent localization scheme for WSN, and it is shown that SeRLoc is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and compromised sensors.
Abstract
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location-aware WSN applications, it is essential to ensure that sensors can determine their location, even in the presence of malicious adversaries. In this paper we address the problem of enabling sensors of WSN to determine their location in an un-trusted environment. Since localization schemes based on distance estimation are expensive for the resource constrained sensors, we propose a range-independent localization algorithm called SeRLoc. SeRLoc is distributed algorithm and does not require any communication among sensors. In addition, we show that SeRLoc is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and compromised sensors. To the best of our knowledge, ours is the first work that provides a security-aware range-independent localization scheme for WSN. We present a threat analysis and comparison of the performance of SeRLoc with state-of-the-art range-independent localization schemes.

read more

Citations
More filters
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Proceedings ArticleDOI

The feasibility of launching and detecting jamming attacks in wireless networks

TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Journal ArticleDOI

Sensor network security: a survey

TL;DR: This paper identifies the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first, and gives a holistic overview of security issues.
Proceedings ArticleDOI

Secure positioning of wireless devices with application to sensor networks

TL;DR: This work proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.

Challenges in Securing Vehicular Networks

Bryan Parno, +1 more
TL;DR: A set of security primitives that can be used as the building blocks of secure applications for vehicular networks are proposed, and their success and safety will depend on viable security solutions acceptable to consumers, manufacturers and governments.
References
More filters
Proceedings ArticleDOI

RADAR: an in-building RF-based user location and tracking system

TL;DR: RADAR is presented, a radio-frequency (RF)-based system for locating and tracking users inside buildings that combines empirical measurements with signal propagation modeling to determine user location and thereby enable location-aware services and applications.
Book

Statistics for spatial data

TL;DR: In this paper, the authors present a survey of statistics for spatial data in the field of geostatistics, including spatial point patterns and point patterns modeling objects, using Lattice Data and spatial models on lattices.
Journal ArticleDOI

5. Statistics for Spatial Data

TL;DR: Cressie et al. as discussed by the authors presented the Statistics for Spatial Data (SDS) for the first time in 1991, and used it for the purpose of statistical analysis of spatial data.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Proceedings ArticleDOI

The Cricket location-support system

TL;DR: The randomized algorithm used by beacons to transmit information, the use of concurrent radio and ultrasonic signals to infer distance, the listener inference algorithms to overcome multipath and interference, and practical beacon configuration and positioning techniques that improve accuracy are described.
Related Papers (5)