Abstract
The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.
Original language | English |
---|---|
Pages (from-to) | 685-701 |
Number of pages | 17 |
Journal | Journal of Supercomputing |
Volume | 64 |
Issue number | 3 |
DOIs | |
Publication status | Published - 1 Jun 2013 |
Keywords
- Computer network security
- Location verification
- Secure localization
- Wireless sensor networks
ASJC Scopus subject areas
- Software
- Theoretical Computer Science
- Information Systems
- Hardware and Architecture