Abstract
In the last decade, researchers have proposed a number of localization and ranging techniques for wireless networks [2,5,12,26,39,40]. The use of these techniques is broad and ranges from enabling networking functions (i.e., location-based routing) to enabling location-related applications (e.g., access control, data harvesting).
The author acknowledges contributions from Mario Čagalj, Jean-Pierre Hubaux and Mani Srivastava to original publications [36–38] from which this chapter is compiled.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson and M. Kuhn, “Tamper resistance-a cautionary note,” in Proceedings of the Second Usenix Workshop on Electronic Commerce, 1996.
P. Bahl and V. N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), vol. 2, 2000, pp. 775–784.
S. Brands and D. Chaum, “Distance-bounding protocols,” in Workshop on the theory and application of cryptographic techniques on Advances in cryptology. Springer-Verlag New York, Inc., 1994, pp. 344–359.
N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low cost outdoor localization for very small devices,” IEEE Personal Communications Magazine, vol. 7, no. 5, pp. 28–34, October 2000.
P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A Probabilistic Room Location Service for Wireless Networked Environments,” in Proceedings of the Third International Conference Atlanta Ubiquitous Computing (Ubicomp), vol. 2201. Springer-Verlag Heidelberg, September 2001.
L. Doherty, K. Pister, and L. El Ghaoui, “Convex position estimation in wireless sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), April 2001.
T. Eren, D. Goldenberg, W. Whiteley, Y. Yang, A. Morse, B. Anderson, and P. Belhumeur, “Rigidity, computation, and randomization in network localization,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2004.
R. Fontana, “Experimental Results from an Ultra Wideband Precision Geolocation System,” Ultra-Wideband, Short-Pulse Electromagnetics, May 2000.
R. Fontana, E. Richley, and J. Barney, “Commercialization of an Ultra Wideband Precision Asset Location System,” in IEEE Conference on Ultra Wideband Systems and Technologies, November 2003.
I. Getting, “The Global Positioning System,” IEEE Spectrum, December 1993.
M. Gruteser and D. Grunwald, “Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis,” in Proceedings of WMASH, 2003.
I. Hightower, G. Boriello, and R. Want, “SpotON: An indoor 3D Location Sensing Technology Based on RF Signal Strength,” University of Washington, Tech. Rep. 2000-02-02, 2000.
Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), San Francisco, USA, April 2003.
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “Enhancing Wireless Location Privacy Using Silent Period,” in Proceedings of the IEEE Wireless Communications and Networking Conference(WCNC), 2005.
J. Kong and X. Hong, “ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks,” in Proceedings of MobiHoc, 2003.
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, “Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), 2005.
M. G. Kuhn, “An Asymmetric Security Mechanism for Navigation Signals,” in Proceedings of the Information Hiding Workshop, 2004.
L. Lazos, S. Čapkun, and R. Poovendran, “ROPE: Robust Position Estimation in Wireless Sensor Networks,” in Proceedings of IPSN, 2005.
J.-Y. Lee and R. Scholtz, “Ranging in a Dense Multipath Environment Using an UWB Radio Link,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 9, December 2002.
Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wire-less Localization in Sensor Networks,” in Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.
D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” in Proceedings of the International Conference on Information Processing in Sensor Net-works (IPSN), 2005.
D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements,” in Proceedings of the ACM Conference on Networked Sensor Systems (SenSys). ACM Press, 2004, pp. 50–61.
D. Niculescu and B. Nath, “Ad hoc positioning system (aps) using aoa,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), San Francisco, USA, April 2003.
—, “DV Based Positioning in Ad hoc Networks,” Journal of Telecommunication Systems, vol. 22, no. 4, pp. 267–280, 2003.
V. V. Nostrand, Mathematics of Statistics. Princeton, NJ, 1962.
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket location-support system,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). ACM Press, 2000, pp. 32–43.
A. R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” Pervasive Computing, January–March 2003.
I. W. Jackson, “Anonymous Addresses and Confidentiality of Location,” in Proceedings of International Workshop on Information Hiding, 1996.
M. G. Kendall and P.A.P. Moran, Geometrical Probability. Hafner, New York, 1963.
Y.-C. Hu and H. J. Wang, “Location Privacy in Wireless Networks,” in Proceedings of the ACM SIGCOMM Asia Workshop, 2005.
N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location claims,” in Proceedings of the ACM Workshop on Wireless Security (WiSe). ACM Press, September 2003, pp. 1–10.
A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in Ad-Hoc networks of sensors,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). ACM Press, 2001, pp. 166–179.
D. Shaw and W. Kinsner, “Multifractal Modeling of Radio Transmitter Transients for Gasification,” in Proceedings of the IEEE Conference on Communications, Power and Computing, May 1997, pp. 306–312.
S. Čapkun, L. Buttyán, and J.-P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, USA, October 2003.
S. Čapkun, M. Hamdi, and J.-P. Hubaux, “GPS-free Positioning in Mobile Ad-Hoc Net-works,” Cluster Computing, vol. 5, no. 2, April 2002.
S. Čapkun and J.-P. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2005.
S. Čapkun and J.-P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006.
S. Čapkun, M. Čagalj, and M. Srivastava, “Secure Localization with Hidden and Mobile Base Stations,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2006.
R. Want, A. Hopper, V. Falcao, and J. Gibbons, “The Active Badge Location system,” ACM Transactions on Information Systems, vol. 10, no. 1, pp. 91–102, 1992.
A. Ward, A. Jones, and A. Hopper, “A New Location Technique for the Active Office,” IEEE Personal Communications, vol. 4, no. 5, October 1997.
J. S. Warner and R. G. Johnston, “Think GPS Cargo Tracking = High Security? Think Again,” Technical report, Los Alamos National Laboratory, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Čapkun, S. (2007). Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations) . In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-46276-9_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32721-1
Online ISBN: 978-0-387-46276-9
eBook Packages: Computer ScienceComputer Science (R0)