Advertisement

Localization Attacks and Countermeasures

  • Jessica Feng Sanford
  • Miodrag Potkonjak
  • Sasha Slijepcevic
Chapter

Abstract

Among the many different viable applications of WASNs, there is a large class of applications intended for use in potentially inhospitable environments, such as military environments or various security systems. For example, WSN could be used very effectively for tracking objects in a battlefield or in securing a perimeter around sensitive industrial sites. In such applications, there is a strong possibility that adversaries could try to obstruct the normal operation of the network.

Keywords

Location Error Location Estimate Target Node Average Location Error Network Setup 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    T. He, S. Krishnamurthy, J. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, in 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys04), Boston, MA, Jun 2004Google Scholar
  2. 2.
    G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, Sensor Network-Based Countersniper System, in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Nov 2004Google Scholar
  3. 3.
    F. Stajano, R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hocWireless Networks, in 7th Security Protocols Workshop, pp. 55–66 (1999)Google Scholar
  4. 4.
    Y. Hu, A. Perrig, D. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRefGoogle Scholar
  5. 5.
    J. Newsome, R. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), Apr 2004Google Scholar
  6. 6.
    Will Naylor and Bill Chapman, Free Software Which You Can Download (2010), http://www.willnaylor.com/wnlib.html
  7. 7.
    S. Capkun, S. Ganeriwal, F. Anjum, M. Srivastava, Secure RSSbased Localization in Sensor Networks, Technical Report 529, ETH Zurich, 2006Google Scholar
  8. 8.
    Z. Li, Y. Zhang,W. Trappe, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 91–98Google Scholar
  9. 9.
    D. Liu, P. Ning, W. Du, Attack-Resistant Location Estimation in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 99–106Google Scholar
  10. 10.
    L. Girod, A self-calibrating system of distributed acoustic arrays, PhD thesis, University of California, Los Angeles, 2005Google Scholar
  11. 11.
    A. Ward, A. Jones, A. Hopper, A new location technique for the active office. IEEE Pers. Commun. 4(5), 42–47 (1997). OctCrossRefGoogle Scholar
  12. 12.
    L. Girod, M. Lukac, V. Trifa, D. Estrin, The design and implementation of a self-calibrating acoustic sensing platform, in Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), 2006, pp. 71–84Google Scholar
  13. 13.
    P.J. Rousseeuw, A.M. Leroy, Robust Regression and Outlier Detection (Wiley-Interscience, New York, 2003). SeptemberGoogle Scholar
  14. 14.
    R. Yarlagadda, I. Ali, N. Al-Dhahir, J. Hershey, GPS GDOP metric, in IEE Proceedings on Radar, Sonar, and Navigation, 2000, pp. 259–264Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  • Jessica Feng Sanford
    • 1
  • Miodrag Potkonjak
    • 2
  • Sasha Slijepcevic
    • 3
  1. 1.Booz Allen Hamilton Inc.Los AngelesUSA
  2. 2.Computer ScienceUniversity of CaliforniaLos AngelesUSA
  3. 3.Texas InstrumentsSanta BarbaraUSA

Personalised recommendations