12,890 research outputs found
Securing Localization With Hidden and Mobile Base Stations
Abstract — Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed that aim to detect and prevent attacks on localization systems. In this work, we propose a new approach to secure localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructurecentric localization schemes. We further show how this approach can be applied to secure localization in sensor networks. I
Deterministic Secure Positioning in Wireless Sensor Networks
Properly locating sensor nodes is an important building block for a large
subset of wireless sensor networks (WSN) applications. As a result, the
performance of the WSN degrades significantly when misbehaving nodes report
false location and distance information in order to fake their actual location.
In this paper we propose a general distributed deterministic protocol for
accurate identification of faking sensors in a WSN. Our scheme does \emph{not}
rely on a subset of \emph{trusted} nodes that are not allowed to misbehave and
are known to every node in the network. Thus, any subset of nodes is allowed to
try faking its position. As in previous approaches, our protocol is based on
distance evaluation techniques developed for WSN. On the positive side, we show
that when the received signal strength (RSS) technique is used, our protocol
handles at most faking sensors. Also, when the
time of flight (ToF) technique is used, our protocol manages at most misbehaving sensors. On the negative side, we prove
that no deterministic protocol can identify faking sensors if their number is
. Thus our scheme is almost optimal with respect
to the number of faking sensors. We discuss application of our technique in the
trusted sensor model. More precisely our results can be used to minimize the
number of trusted sensors that are needed to defeat faking ones
Security in Wireless Sensor Networks: Issues and Challenges
Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.Comment: 6 page
Secure positioning in wireless networks
So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations
Optimal Information-Theoretic Wireless Location Verification
We develop a new Location Verification System (LVS) focussed on network-based
Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we
develop is based on an information-theoretic framework which uses the received
signal strength (RSS) from a network of base-stations and the claimed position.
Based on this information we derive the optimal decision regarding the
verification of the user's location. Our algorithm is optimal in the sense of
maximizing the mutual information between its input and output data. Our
approach is based on the practical scenario in which a non-colluding malicious
user some distance from a highway optimally boosts his transmit power in an
attempt to fool the LVS that he is on the highway. We develop a practical
threat model for this attack scenario, and investigate in detail the
performance of the LVS in terms of its input/output mutual information. We show
how our LVS decision rule can be implemented straightforwardly with a
performance that delivers near-optimality under realistic threat conditions,
with information-theoretic optimality approached as the malicious user moves
further from the highway. The practical advantages our new
information-theoretic scheme delivers relative to more traditional Bayesian
verification frameworks are discussed.Comment: Corrected typos and introduced new threat model
- …