loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kaiqi Xiong and David Thuente

Affiliation: North Carolina State University, United States

Keyword(s): Wireless sensor network (WSN), Sensor localization, Vulnerability, and Security.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Network Security ; Sensor and Mobile Ad Hoc Network Security

Abstract: The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. It is impractical to have a GPS device on each sensor in WSN due to costs. Most of the existing location discovery schemes can only be used in the trusted environment. Recent research has addressed security issues in sensor network localization but, to the best of our knowledge, none has completely solved the secure localization problem. In this paper, we propose novel schemes for secure dynamic localization in sensor networks. The proposed algorithms tolerate up to 50% of beacon nodes being malicious and they have linear computation time with respect to the number of reference nodes. We have conducted simulations to analyze their performance.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.22.181.81

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Xiong, K. and Thuente, D. (2008). EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES. In Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT; ISBN 978-989-8111-59-3; ISSN 2184-3236, SciTePress, pages 190-196. DOI: 10.5220/0001927501900196

@conference{secrypt08,
author={Kaiqi Xiong. and David Thuente.},
title={EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT},
year={2008},
pages={190-196},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001927501900196},
isbn={978-989-8111-59-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT
TI - EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES
SN - 978-989-8111-59-3
IS - 2184-3236
AU - Xiong, K.
AU - Thuente, D.
PY - 2008
SP - 190
EP - 196
DO - 10.5220/0001927501900196
PB - SciTePress