{"title":"传感器网络中的安全定位方案","authors":"Kaiqi Xiong, D. Thuente","doi":"10.1109/HONET.2006.5338402","DOIUrl":null,"url":null,"abstract":"The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. Since it is impractical to have a GPS device on each sensor in WSN, most of the existing location discovery schemes can only be used in the trusted environment. Recently, some advanced research has addressed security issues in sensor network localization, but to the best of our knowledge, none of them has completely solved the secure localization problem. In this paper, we propose novel schemes for secure localization in sensor networks. One of these proposed schemes requires only linear computation time with respect to the number of reference nodes. Our security analysis has shown that our schemes are applicable and resilient to attacks from adversaries. We have further conducted simulations to analyze the performance of these schemes.","PeriodicalId":346712,"journal":{"name":"2006 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secure localization schemes in sensor networks\",\"authors\":\"Kaiqi Xiong, D. Thuente\",\"doi\":\"10.1109/HONET.2006.5338402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. Since it is impractical to have a GPS device on each sensor in WSN, most of the existing location discovery schemes can only be used in the trusted environment. Recently, some advanced research has addressed security issues in sensor network localization, but to the best of our knowledge, none of them has completely solved the secure localization problem. In this paper, we propose novel schemes for secure localization in sensor networks. One of these proposed schemes requires only linear computation time with respect to the number of reference nodes. Our security analysis has shown that our schemes are applicable and resilient to attacks from adversaries. We have further conducted simulations to analyze the performance of these schemes.\",\"PeriodicalId\":346712,\"journal\":{\"name\":\"2006 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HONET.2006.5338402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on High Capacity Optical Networks and Enabling Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HONET.2006.5338402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. Since it is impractical to have a GPS device on each sensor in WSN, most of the existing location discovery schemes can only be used in the trusted environment. Recently, some advanced research has addressed security issues in sensor network localization, but to the best of our knowledge, none of them has completely solved the secure localization problem. In this paper, we propose novel schemes for secure localization in sensor networks. One of these proposed schemes requires only linear computation time with respect to the number of reference nodes. Our security analysis has shown that our schemes are applicable and resilient to attacks from adversaries. We have further conducted simulations to analyze the performance of these schemes.