Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SENSORCOMM.2008.79guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks

Published: 25 August 2008 Publication History

Abstract

Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location service. The localization issue in wireless sensor networks under the non-adversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied location service under the adversarial scenario. In this paper, we propose an attack-resistant localization scheme, called TSCD secure localization, to overcome the distance-consistent spoofing attack in wireless sensor networks. The main idea of the TSCD scheme is to firstly apply the temporal and spatial properties of locators to detect some attacked locators, and then utilize the consistent property of the detected attacked locators to find out other attacked locators. An enhanced TSCD scheme is also presented and analyzed. Simulation results demonstrate that both proposed schemes achieve better performance than existing approaches under the same network parameters.

Cited By

View all
  • (2018)On providing wormhole-attack-resistant localization using conflicting setsWireless Communications & Mobile Computing10.1002/wcm.246215:15(1865-1881)Online publication date: 27-Dec-2018
  • (2010)A secure localization approach against wormhole attacks using distance consistencyEURASIP Journal on Wireless Communications and Networking10.1155/2010/6270392010(1-11)Online publication date: 1-Apr-2010
  • (2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security (TISSEC)10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SENSORCOMM '08: Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications
August 2008
856 pages
ISBN:9780769533308

Publisher

IEEE Computer Society

United States

Publication History

Published: 25 August 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)On providing wormhole-attack-resistant localization using conflicting setsWireless Communications & Mobile Computing10.1002/wcm.246215:15(1865-1881)Online publication date: 27-Dec-2018
  • (2010)A secure localization approach against wormhole attacks using distance consistencyEURASIP Journal on Wireless Communications and Networking10.1155/2010/6270392010(1-11)Online publication date: 1-Apr-2010
  • (2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security (TISSEC)10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010
  • (2009)Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor NetworksProceedings of the 6th International Conference on Ubiquitous Intelligence and Computing10.1007/978-3-642-02830-4_23(296-309)Online publication date: 6-Jul-2009

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media