Secure localization and location verification in wireless sensor networks: A survey

Yingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie

Research output: Journal article publicationJournal articleAcademic researchpeer-review

72 Citations (Scopus)


The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.
Original languageEnglish
Pages (from-to)685-701
Number of pages17
JournalJournal of Supercomputing
Issue number3
Publication statusPublished - 1 Jun 2013


  • Computer network security
  • Location verification
  • Secure localization
  • Wireless sensor networks

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Hardware and Architecture


Dive into the research topics of 'Secure localization and location verification in wireless sensor networks: A survey'. Together they form a unique fingerprint.

Cite this