Abstract
Wireless Sensor Networks (WSNs) are envisioned to be integrated into our everyday lives, enabling a wealth of commercial applications such as environmental and habitat monitoring, disaster relief and emergency rescue operations, patient monitoring, as well as military applications such as target detection and tracking. These applications are facilitated by the collaborative processing of the physical properties monitored by the sensors, such as temperature, light, sound, humidity, vibration, acceleration, or air quality.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
P. Bahl and V. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, In Proc. of the IEEE INFOCOM 2000, Tel-Aviv, Israel, March 2000.
S. Basagni, I. Chlamtac, V. Syrotiuk, and B. Woodward, A Distance Routing Effect Algorithm for Mobility (DREAM), In Proc. of MOBICOM 1998, Dallas, TX, USA, October 1998.
S. Brands and D. Chaum, Distance-bounding protocols, in Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag New York, Inc., 1994, pp. 344–359.
N. Bulusu, J. Heidemann and D. Estrin, GPS-less Low Cost Outdoor Localization for Very Small Devices, In IEEE Personal Communications Magazine, 7(5):28–34, October 2000.
S. Čapkun and J.-P. Hubaux, Secure Positioning in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006.
S. Čapkun, L. Buttyan, J. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, in Proc. of SASN 2003, Fairfax, Virginia, October 2003.
S. Čapkun, M. Cagalj, and M. Srivastava, Secure Localization with Hidden and Mobile Base Stations, in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2006.
D. Coppersmith and M. Jakobsson, Almost optimal hash sequence traversal, In Proc. of the FC 2002, Lecture Notes in Computer Science, IFCA, Springer-Verlag, Berlin Germany, 2002.
N. Cressie, Statistics for Spatial Data, John Wiley & Sons, 1993.
L. Doherty, L. Ghaoui and K. Pister, Convex Position Estimation in Wireless Sensor Networks, In Proc. of the IEEE INFOCOM 2001, Anchorage, April 2001.
J. Douceur, The Sybil Attack, In Proc of IPTPS 2002, Cambridge, MA, USA, March 2002.
T. He, C. Huang, B. Blum, J. Stankovic and T. Abdelzaher, Range-Free Localization Schemes in Large Scale Sensor Network, In Proc. of MOBICOM 2003, San Diego, CA, USA, September 2003.
Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks, In Proc. of INFOCOM 2003, San Francisco, CA, USA, April 2003.
M. G. Kuhn, An Asymmetric Security Mechanism for Navigation, in Proceedings of the Information Hiding Workshop, 2004.
L. Lamport, Password Authentication with Insecure Communication, In Communications of the ACM, 24(11):770–772, November 1981.
L. Lazos and R. Poovendran, Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information, In Proc. of IEEE ICASSP 2003, Hong Kong, China, April 2003.
L. Lazos and R. Poovendran, SeRLoc: Robust Localization for Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN), August 2005, vol. 1, pp. 73–100.
L. Lazos and R. Poovendran, HiRLoc: High Resolution Localization for Wireless Sensor Networks, IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Network Security, February 2006, Vol. 24(2), pp. 233–246.
L. Lazos and R. Poovendran, SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks, ACM Workshop on Wireless Security, October 2004, (WiSe’ 04), pp. 21–30.
L. Lazos, S. Čapkun and R. Poovendran, ROPE: Robust Position Estimation in Wireless Sensor Networks, 4th International Symposium on Sensor Networks, April 2005, (IPSN’ 05), pp. 324–331.
Z. Li, W. Trappe, Y. Zhang, and B. Nath, Robust Statistical Methods for Securing Wire-less Localization in Sensor Networks, in Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.
D. Liu and P. Ning, Location-based pairwise key establishments for static sensor net-works, In Proc. of SASN 2003, Fairfax, VA, October 2003.
D. Liu, P. Ning, and W. Du, Attack-Resistant Location Estimation in Sensor Networks, in Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.
MICA Wireless Measurement System, available at: http://www.xbow.com /Products/Product_pdf_files/Wireless.pdf/MICA.pdf.
R. Nagpal, H. Shrobe and J. Bachrach, Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network, In Proc. of IPSN 2003, Palo Alto, USA, April, 2003.
J. Newsome, E. Shi, D. Song and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, In Proc, of IPSN 2004, Berkeley, CA, April 2004.
D. Nicolescu and B. Nath, Ad-Hoc Positioning Systems (APS), In Proc. of IEEE GLOBECOM 2001, San Antonio, TX, USA, November 2001.
P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad Hoc Networks, in Proc. of CNDS 2002, January 2002.
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. Tygar, SPINS: Security Protocols for Sensor Networks, In Proc of MOBICOM 2001, Rome, Italy, July 2001.
R. Poovendran and L. Lazos, A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks, to appear in ACM/Springer Journal on Wireless Networks (WINET).
N. Priyantha, A. Chakraborthy and H. Balakrishnan, The Cricket Location-Support System, In Proc. of MOBICOM 2000, Boston, MA, USA, August 2000.
R. L. Rivest, The RC5 encryption algorithm, In Proc. of the first Workshop on Fast Soft-ware Encryption, pp. 86–96, 1995.
N. Sastry, U. Shankar and D. Wagner, Secure Verification of Location Claims, In Proc. of WISE 2003, San Diego, CA, USA, September 2003.
A. Savvides, C. Han and M. Srivastava, Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors, In Proc. of MOBICOM 2001, Rome, July 2001.
Y. Shang, W. Ruml, Y. Zhang and M. Fromherz, Localization from Mere Connectivity, In Proc. of MOBIHOC 2003, Annapolis, MD, USA, June 2003.
B. Hofmann-Wellenhof, H. Lichtenegger and J. Collins, Global Positioning System: Theory and Practice, Fourth Edition, Springer-Verlag, 1997.
D. Stinson, Cryptograhpy: Theory and Practice, 2nd edition, CRC Press, 2002.
R. Pickholtz, D. Schilling, and L. Milstein. Theory of Spread Spectrum Communications-A Tutorial, In the IEEE Transactions on Communications, 30(5):855–884, May 1982.
S. B. Wicker and M.D. Bartz, Type-II Hybrid-ARQ Protocols Using Punctured MDS Codes, In Proc. of IEEE Transactions on Communications, April 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Lazos, L., Poovendran, R. (2007). Secure Localization for Wireless Sensor Networks using Range-Independent Methods. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-46276-9_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32721-1
Online ISBN: 978-0-387-46276-9
eBook Packages: Computer ScienceComputer Science (R0)