• Corpus ID: 1577749

SLAT : Secure Localization with Attack Tolerance

@inproceedings{Pirretti2005SLATS,
  title={SLAT : Secure Localization with Attack Tolerance},
  author={Matthew Pirretti and Narayanan Vijaykrishnan and Patrick Mcdaniel and Bharat B. Madan},
  year={2005}
}
Accurate and secure localization is essential to the correct operation of many applications of sensor networks. However, existing methods lack concrete security mechanisms or are not resilient to beacon node compromise. We address the limitations of present approaches in this paper through the Secure Localization with Attack Tolerance (SLAT) protocol. In SLAT, non-beacon nodes estimate their positions by calculating the intersection of multiple authenticated beacon messages. Message… 
Secure range-free localization scheme in Wireless sensor networks
TLDR
A Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure and it is shown that the solution is effective in detecting and defending against wormhole attacks with a high detection rate.
On providing wormhole-attack-resistant localization using conflicting sets
TLDR
This paper proposes a secure localization scheme against the wormhole attacks called SLAW including three phases: wormhole attack detection, neighboring locators differentiation, and secure localization.
Secure localization against wormhole attacks using conflicting sets
TLDR
A secure localization scheme against wormhole attacks, which includes three phases: wormhole attack detection, neighboring locators differentiation and secure localization, which outperforms the existed schemes under different network parameters.
Secure Location Estimation in Large Scale Wireless Sensor Networks
  • S. H. Arisar, A. Kemp
  • Computer Science
    2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
  • 2009
TLDR
This paper presents a two-way “Greet, Meet and Locate” mechanism for secure location estimation in large scale wireless sensor networks based on geographical sectorization and a double-averaging mechanism is presented that uses a time of arrival (TOA) based localization technique to help minimize the location estimation errors.
ANovel Secure Localization Approach in Wireless Sensor Networks
TLDR
Three attack-resistant localization schemes are proposed to stand against the distance-consistent spoofing attack in wireless sensor networks, called basic, enhanced and mobility-aided TSCD secure localization schemes, respectively.
A Novel Secure Localization Approach in Wireless Sensor Networks
TLDR
Three attack-resistant localization schemes are proposed to stand against the distance-consistent spoofing attack in wireless sensor networks, called basic, enhanced and mobility-aided TSCD secure localization schemes, respectively.
Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks
TLDR
The main idea of the approach is to plug in a proactive countermeasure to the basic DV‐Hop scheme called Infection prevention, which is effective in detecting and defending against wormhole attacks with a high detection rate.
A LITERATURE SURVEY ON LOCALIZATION ALGORITHMS IN WIRELESS SENSOR NETWORKS
TLDR
This paper separates range-based schemes and range-free schemes into two types: fully schemes and hybrid schemes, and compares the most relevant localization algorithms and discusses the future research directions for wireless sensor networks localization schemes.
Wireless sensor networks localization algorithms: a comprehensive survey
TLDR
This paper separates range-based schemes and range-free schemes into two types: fully schemes and hybrid schemes, and compares the most relevant localization algorithms and discusses the future research directions for wireless sensor networks localization schemes.
Guaranteeing the Authenticity of Location Information
TLDR
A comprehensive definition of location authentication is presented, its main threats in different scenarios are described, and the mechanisms proposed thus far to fulfil this requirement are reviewed.
...
...

References

SHOWING 1-10 OF 27 REFERENCES
Attack-resistant location estimation in sensor networks
TLDR
Two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks are presented and the experimental results demonstrate that the proposed methods are promising for the current generation of sensor networks.
SeRLoc: secure range-independent localization for wireless sensor networks
TLDR
This is the first work that provides a security-aware range-independent localization scheme for WSN, and it is shown that SeRLoc is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and compromised sensors.
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
TLDR
The security of LEAP+ under various attack models is analyzed and it is shown that it is very effective in defending against many sophisticated attacks, such as HELLO flood attacks, node cloning attacks, and wormhole attacks.
Range-free localization schemes for large scale sensor networks
TLDR
This paper presents APIT, a novel localization algorithm that is range-free, and shows that the APIT scheme performs best when an irregular radio pattern and random node placement are considered, and low communication overhead is desired.
Denial of Service in Sensor Networks
TLDR
To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.
Security in wireless sensor networks
TLDR
A highly decentralized algorithm for the detection and mapping of jammed regions of a WSN is discussed, which is robust to failures and can operate on partial information (a type of anytime algorithm), and several potential future directions for security solutions are considered.
Secure verification of location claims
TLDR
The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.
Robust location detection in emergency sensor networks
TLDR
A new framework for providing robust location detection in emergency response systems, based on the theory of identifying codes, is proposed and a new polynomial-time algorithm for generating irreducible codes for arbitrary topologies is analyzed.
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
TLDR
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
...
...