TY - GEN
T1 - Location verification using communication range variation for wireless sensor networks
AU - Al-Abri, Dawood
AU - McNair, Janise
AU - Ekici, Eylem
PY - 2006
Y1 - 2006
N2 - Localization plays an important role in wireless sensor networks, since sensors need to associate their readings with location in order to deliver meaningful information. A promising approach to enhance the robustness and the security of localization is location verification, where the objective is to verify a node's claimed location. In this paper, we propose a new location verification protocol, where verifier nodes vary their communication range in order to triangulate the position of a node. We first present the network model and our assumptions, followed by a detailed description of the protocol. Next, a security analysis is provided which shows that the new approach is robust against several location spoofing attacks. Moreover, we derive both analytical and simulation results for the coverage probability and show that a high coverage probability can be achieved with the new protocol, even with a relatively low density of verifier nodes. Finally, we study the impact of localization error on the verification probability and demonstrate that the protocol is sensitive enough to detect small deviations between claimed and actual locations.
AB - Localization plays an important role in wireless sensor networks, since sensors need to associate their readings with location in order to deliver meaningful information. A promising approach to enhance the robustness and the security of localization is location verification, where the objective is to verify a node's claimed location. In this paper, we propose a new location verification protocol, where verifier nodes vary their communication range in order to triangulate the position of a node. We first present the network model and our assumptions, followed by a detailed description of the protocol. Next, a security analysis is provided which shows that the new approach is robust against several location spoofing attacks. Moreover, we derive both analytical and simulation results for the coverage probability and show that a high coverage probability can be achieved with the new protocol, even with a relatively low density of verifier nodes. Finally, we study the impact of localization error on the verification probability and demonstrate that the protocol is sensitive enough to detect small deviations between claimed and actual locations.
UR - http://www.scopus.com/inward/record.url?scp=35148885198&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35148885198&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2006.302443
DO - 10.1109/MILCOM.2006.302443
M3 - Conference contribution
AN - SCOPUS:35148885198
SN - 1424406188
SN - 9781424406180
T3 - Proceedings - IEEE Military Communications Conference MILCOM
BT - Military Communications Conference 2006, MILCOM 2006
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - Military Communications Conference 2006, MILCOM 2006
Y2 - 23 October 2006 through 25 October 2006
ER -