TY - GEN
T1 - A probabilistic approach to location verification in wireless sensor networks
AU - Ekici, Eylem
AU - McNair, Janise
AU - Al-Abri, Dawood
PY - 2006
Y1 - 2006
N2 - Security plays an important role in the ability to deploy and retrieve trustworthy data from a wireless sensor network. Location verification is an effective first line of defense against attacks which take advantage of a lack, or compromise, of location information. In this work, a probabilistic approach to location verification in dense sensor networks is proposed. The proposed Probabilistic Location Verification (PLV) algorithm leverages the probabilistic dependence of the number of hops a broadcast packet traverses to reach a destination and the Euclidean distance between source and destination. A small number of verifier nodes determine the plausibility of the claimed location, which is represented by a real number between zero and one. Using the calculated plausibility metric, it is possible to create arbitrary number of trust levels in the location claimed. Simulation studies verify that the proposed solution provides high performance in face of various types of attacks.
AB - Security plays an important role in the ability to deploy and retrieve trustworthy data from a wireless sensor network. Location verification is an effective first line of defense against attacks which take advantage of a lack, or compromise, of location information. In this work, a probabilistic approach to location verification in dense sensor networks is proposed. The proposed Probabilistic Location Verification (PLV) algorithm leverages the probabilistic dependence of the number of hops a broadcast packet traverses to reach a destination and the Euclidean distance between source and destination. A small number of verifier nodes determine the plausibility of the claimed location, which is represented by a real number between zero and one. Using the calculated plausibility metric, it is possible to create arbitrary number of trust levels in the location claimed. Simulation studies verify that the proposed solution provides high performance in face of various types of attacks.
KW - Localization
KW - Location verification
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=42549116750&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=42549116750&partnerID=8YFLogxK
U2 - 10.1109/ICC.2006.255612
DO - 10.1109/ICC.2006.255612
M3 - Conference contribution
AN - SCOPUS:42549116750
SN - 1424403553
SN - 9781424403554
T3 - IEEE International Conference on Communications
SP - 3485
EP - 3490
BT - 2006 IEEE International Conference on Communications, ICC 2006
T2 - 2006 IEEE International Conference on Communications, ICC 2006
Y2 - 11 July 2006 through 15 July 2006
ER -