Secure positioning of wireless devices with application to sensor networks
So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call v...
Saved in:
Published in | Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 3; pp. 1917 - 1928 vol. 3 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2005
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations. |
---|---|
ISBN: | 9780780389687 0780389689 |
ISSN: | 0743-166X 2641-9874 |
DOI: | 10.1109/INFCOM.2005.1498470 |