Secure positioning of wireless devices with application to sensor networks

So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call v...

Full description

Saved in:
Bibliographic Details
Published inProceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 3; pp. 1917 - 1928 vol. 3
Main Authors Capkun, S., Hubaux, J.-P.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.
ISBN:9780780389687
0780389689
ISSN:0743-166X
2641-9874
DOI:10.1109/INFCOM.2005.1498470