Skip to main content

Secure Localization and Location Verification in Sensor Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

Abstract

Evolving networks of wireless sensing nodes have many attractive applications. Localization, that is to determine the locations of sensor nodes, is a key enabler for many applications of sensor networks. As sensor networks move closer to extensive deployments, security becomes a major concern, resulting in a new demand for secure localization and location proving systems. In this paper, we propose a secure localization system based on a secure hop algorithm. A location verification system that allows the base station to verify the locations of sensor nodes is also presented. It prevents a node from falsifying reported location information. The evaluation of the secure localization system shows that the proposed scheme performs well under a range of scenarios tested and is resilient against an attacker creating incorrect location information in other nodes.

This work was supported by DARPA (Defense Advanced Research Projects Agency, USA) IXO NEST (Network Embedded Software Technology) program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Doherty, L., Pister, K.S.J., Ghaoui, L.E.: Convex Position Estimation in Wireless Sensor Networks. In: Proceedings of IEEE infocom 2001, pp. 1655–1663 (2001)

    Google Scholar 

  2. Savarese, C., Langendoen, K., Rabaey, J.: Robust Positioning Algorithms for Distributed Ad-Hooc Wireless Sensor Networks. In: USENIX Tech. Annual Conference, pp. 317–328 (2002)

    Google Scholar 

  3. Niculescu, D., Nath, B.: Ad Hoc Positioning System(APS). In: IEEE GlobeCom 2001, pp. 2926–2931 (2001)

    Google Scholar 

  4. Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: Proceedings of the 2003 ACM workshop on Wireless Security, pp. 1–10 (2003)

    Google Scholar 

  5. Waters, B., Felten, E.: Secure, Private Proofs of Location, Technical report TR-667-03, Princeton University (2003)

    Google Scholar 

  6. Capkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report EPFL/IC/200443 (May 2004)

    Google Scholar 

  7. Perrig, A., Hu, Y.C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks. Technical Report TR-01-384, Department of Computer Science, Rice University (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, YH., Phadke, V., Lee, J.W., Deshmukh, A. (2005). Secure Localization and Location Verification in Sensor Networks. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_28

Download citation

  • DOI: https://doi.org/10.1007/11599463_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30856-0

  • Online ISBN: 978-3-540-32276-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics