Location verification using communication range variation for wireless sensor networks

Dawood Al-Abri*, Janise McNair, Eylem Ekici

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


Localization plays an important role in wireless sensor networks, since sensors need to associate their readings with location in order to deliver meaningful information. A promising approach to enhance the robustness and the security of localization is location verification, where the objective is to verify a node's claimed location. In this paper, we propose a new location verification protocol, where verifier nodes vary their communication range in order to triangulate the position of a node. We first present the network model and our assumptions, followed by a detailed description of the protocol. Next, a security analysis is provided which shows that the new approach is robust against several location spoofing attacks. Moreover, we derive both analytical and simulation results for the coverage probability and show that a high coverage probability can be achieved with the new protocol, even with a relatively low density of verifier nodes. Finally, we study the impact of localization error on the verification probability and demonstrate that the protocol is sensitive enough to detect small deviations between claimed and actual locations.

Original languageEnglish
Title of host publicationProceedings - IEEE Military Communications Conference MILCOM
Publication statusPublished - 2007
EventMilitary Communications Conference 2006, MILCOM 2006 - Washington, D.C., United States
Duration: Oct 23 2006Oct 25 2006


OtherMilitary Communications Conference 2006, MILCOM 2006
Country/TerritoryUnited States
CityWashington, D.C.

ASJC Scopus subject areas

  • Civil and Structural Engineering
  • Electrical and Electronic Engineering


Dive into the research topics of 'Location verification using communication range variation for wireless sensor networks'. Together they form a unique fingerprint.

Cite this