1,219 research outputs found
A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries
Wireless Sensor Networks (WSN) support data collection and distributed data
processing by means of very small sensing devices that are easy to tamper and
cloning: therefore classical security solutions based on access control and
strong authentication are difficult to deploy. In this paper we look at the
problem of assessing security of node localization. In particular, we analyze
the scenario in which Verifiable Multilateration (VM) is used to localize nodes
and a malicious node (i.e., the adversary) try to masquerade as non-malicious.
We resort to non-cooperative game theory and we model this scenario as a
two-player game. We analyze the optimal players' strategy and we show that the
VM is indeed a proper mechanism to reduce fake positions.Comment: International Congress on Ultra Modern Telecommunications and Control
Systems 2010. (ICUMT'10
Opportunistic Localization Scheme Based on Linear Matrix Inequality
Enabling self-localization of mobile nodes is an important problem that has been widely studied in the literature.
The general conclusions is that an accurate localization
requires either sophisticated hardware (GPS, UWB, ultrasounds transceiver) or a dedicated infrastructure (GSM, WLAN). In this paper we tackle the problem from a different and rather new perspective: we investigate how localization performance can be improved by means of a cooperative and opportunistic data exchange among the nodes. We consider a target node, completely unaware of its own position, and a number of mobile nodes with some self-localization capabilities. When the opportunity occurs, the target node can exchange data with in-range mobile nodes. This opportunistic data exchange is then used by the target node to refine its position estimate by using a technique based on Linear Matrix Inequalities and barycentric algorithm. To investigate the performance of such an opportunistic localization algorithm, we define a simple mathematical model that describes the opportunistic interactions and, then, we run several computer simulations for analyzing the effect of the nodes duty-cycle and of the native self-localization error modeling considered. The results show that the opportunistic interactions can actually improve the self-localization accuracy of a strayed node in many different scenarios
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
An opportunistic indoors positioning scheme based on estimated positions
The localization requirements for mobile nodes in wireless (sensor) networks are increasing. However, most research works are based on range measurements between nodes which are often oversensitive to the measurement error. In this paper we propose a location estimation scheme based on moving nodes that opportunistically exchange known positions. The user couples a linear matrix inequality (LMI) method with a barycenter computation to estimate its position. Simulations have shown that the accuracy of the estimation increases when the number of known positions increases, the radio range decreases and the node speeds increase. The proposed method only depends on a maximum RSS threshold to take into account a known position, which makes it robust and easy to implement. To obtain an accuracy of 1 meter, a user may have to wait at the same position for 5 minutes, with 8 pedestrians moving within range on average
Group behavior impact on an opportunistic localization scheme
In this paper we tackled the localization problem from an opportunistic perspective, according to which a node can infer its own spatial position by exchanging data with passing by nodes, called peers. We consider an opportunistic localization algorithm based on the linear matrix inequality (LMI) method coupled with a weighted barycenter algorithm. This scheme has been previously analyzed in scenarios with random deployment of peers, proving its effectiveness. In this paper, we extend the
analysis by considering more realistic mobility models for peer nodes. More specifically, we consider two mobility models, namely the Group Random Waypoint Mobility Model and the Group Random Pedestrian Mobility Model, which is an
improvement of the first one. Hence, we analyze by simulation the opportunistic localization algorithm for both the models, in order to gain insights on the impact of nodes mobility pattern onto the localization performance. The simulation results show that the mobility model has non-negligible effect on the final localization error, though the performance of the opportunistic localization scheme remains acceptable in all the considered scenarios
On geometric upper bounds for positioning algorithms in wireless sensor networks
This paper studies the possibility of upper bounding the position error for range-based positioning algorithms in wireless sensor networks. In this study, we argue that in certain situations when the measured distances between sensor nodes have positive errors, e.g., in non-line-of-sight (NLOS) conditions, the target node is confined to a closed bounded convex set (a feasible set) which can be derived from the measurements. Then, we formulate two classes of geometric upper bounds with respect to the feasible set. If an estimate is available, either feasible or infeasible, the position error can be upper bounded as the maximum distance between the estimate and any point in the feasible set (the first bound). Alternatively, if an estimate given by a positioning algorithm is always feasible, the maximum length of the feasible set is an upper bound on position error (the second bound). These bounds are formulated as nonconvex optimization problems. To progress, we relax the nonconvex problems and obtain convex problems, which can be efficiently solved. Simulation results show that the proposed bounds are reasonably tight in many situations, especially for NLOS conditions
Target Tracking in Confined Environments with Uncertain Sensor Positions
To ensure safety in confined environments such as mines or subway tunnels, a
(wireless) sensor network can be deployed to monitor various environmental
conditions. One of its most important applications is to track personnel,
mobile equipment and vehicles. However, the state-of-the-art algorithms assume
that the positions of the sensors are perfectly known, which is not necessarily
true due to imprecise placement and/or dropping of sensors. Therefore, we
propose an automatic approach for simultaneous refinement of sensors' positions
and target tracking. We divide the considered area in a finite number of cells,
define dynamic and measurement models, and apply a discrete variant of belief
propagation which can efficiently solve this high-dimensional problem, and
handle all non-Gaussian uncertainties expected in this kind of environments.
Finally, we use ray-tracing simulation to generate an artificial mine-like
environment and generate synthetic measurement data. According to our extensive
simulation study, the proposed approach performs significantly better than
standard Bayesian target tracking and localization algorithms, and provides
robustness against outliers.Comment: IEEE Transactions on Vehicular Technology, 201
Connectivity-Based Self-Localization in WSNs
Efficient localization methods are among the major challenges in wireless sensor networks today. In this paper, we present our so-called connectivity based approach i.e, based on local connectivity information, to tackle this problem. At first the method fragments the network into larger groups labeled as packs. Based on the mutual connectivity relations with their surrounding packs, we identify border nodes as well as the central node. As this first approach requires some a-priori knowledge on the network topology, we also present a novel segment-based fragmentation method to estimate the central pack of the network as well as detecting so-called corner packs without any a-priori knowledge. Based on these detected points, the network is fragmented into a set of even larger elements, so-called segments built on top of the packs, supporting even more localization information as they all reach the central node
- âŠ