So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.
%0 Conference Proceedings
%1 Capkun05
%A Capkun, Srdjan
%A Hubaux, Jean-Pierre
%B IEEE International Conference on Computer Communications (INFOCOM)
%D 2005
%I IEEE
%K location security verification wireless wsn
%P 1917-1928
%T Secure positioning of wireless devices with application to sensor networks
%V 3
%X So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.
@proceedings{Capkun05,
abstract = {So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.},
added-at = {2014-11-10T15:13:14.000+0100},
author = {Capkun, Srdjan and Hubaux, Jean-Pierre},
biburl = {https://www.bibsonomy.org/bibtex/20c3a81b78062d93ae07f3e0e26a2a978/affitz},
booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
interhash = {9e0b16c4a1b7e9daae38b8952534b9ff},
intrahash = {0c3a81b78062d93ae07f3e0e26a2a978},
keywords = {location security verification wireless wsn},
month = {March},
pages = {1917-1928},
publisher = {IEEE},
timestamp = {2014-11-10T15:13:14.000+0100},
title = {Secure positioning of wireless devices with application to sensor networks},
volume = 3,
year = 2005
}