Secure localization and location verification in sensor networks

Yann-Hang Lee, Vikram Phadke, Jin Wook Lee, Amit Deshmukh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Evolving networks of wireless sensing nodes have many attractive applications. Localization, that is to determine the locations of sensor nodes, is a key enabler for many applications of sensor networks. As sensor networks move closer to extensive deployments, security becomes a major concern, resulting in a new demand for secure localization and location proving systems. In this paper, we propose a secure localization system based on a secure hop algorithm. A location verification system that allows the base station to verify the locations of sensor nodes is also presented. It prevents a node from falsifying reported location information. The evaluation of the secure localization system shows that the proposed scheme performs well under a range of scenarios tested and is resilient against an attacker creating incorrect location information in other nodes.

Original languageEnglish (US)
Title of host publicationMobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Proceedings
PublisherSpringer Verlag
Pages278-287
Number of pages10
ISBN (Print)3540308563, 9783540308560
DOIs
StatePublished - Jan 1 2005
Event1st International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2005 - Wuhan, China
Duration: Dec 13 2005Dec 15 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3794 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2005
Country/TerritoryChina
CityWuhan
Period12/13/0512/15/05

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure localization and location verification in sensor networks'. Together they form a unique fingerprint.

Cite this