Skip to main content
Top

2012 | OriginalPaper | Chapter

7. Localization Attacks and Countermeasures

Authors : Jessica Feng Sanford, Miodrag Potkonjak, Sasha Slijepcevic

Published in: Localization in Wireless Networks

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Among the many different viable applications of WASNs, there is a large class of applications intended for use in potentially inhospitable environments, such as military environments or various security systems. For example, WSN could be used very effectively for tracking objects in a battlefield or in securing a perimeter around sensitive industrial sites. In such applications, there is a strong possibility that adversaries could try to obstruct the normal operation of the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference T. He, S. Krishnamurthy, J. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, in 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys04), Boston, MA, Jun 2004 T. He, S. Krishnamurthy, J. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, in 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys04), Boston, MA, Jun 2004
2.
go back to reference G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, Sensor Network-Based Countersniper System, in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Nov 2004 G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, Sensor Network-Based Countersniper System, in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Nov 2004
3.
go back to reference F. Stajano, R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hocWireless Networks, in 7th Security Protocols Workshop, pp. 55–66 (1999) F. Stajano, R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hocWireless Networks, in 7th Security Protocols Workshop, pp. 55–66 (1999)
4.
go back to reference Y. Hu, A. Perrig, D. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef Y. Hu, A. Perrig, D. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef
5.
go back to reference J. Newsome, R. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), Apr 2004 J. Newsome, R. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), Apr 2004
7.
go back to reference S. Capkun, S. Ganeriwal, F. Anjum, M. Srivastava, Secure RSSbased Localization in Sensor Networks, Technical Report 529, ETH Zurich, 2006 S. Capkun, S. Ganeriwal, F. Anjum, M. Srivastava, Secure RSSbased Localization in Sensor Networks, Technical Report 529, ETH Zurich, 2006
8.
go back to reference Z. Li, Y. Zhang,W. Trappe, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 91–98 Z. Li, Y. Zhang,W. Trappe, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 91–98
9.
go back to reference D. Liu, P. Ning, W. Du, Attack-Resistant Location Estimation in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 99–106 D. Liu, P. Ning, W. Du, Attack-Resistant Location Estimation in Sensor Networks, in Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 99–106
10.
go back to reference L. Girod, A self-calibrating system of distributed acoustic arrays, PhD thesis, University of California, Los Angeles, 2005 L. Girod, A self-calibrating system of distributed acoustic arrays, PhD thesis, University of California, Los Angeles, 2005
11.
go back to reference A. Ward, A. Jones, A. Hopper, A new location technique for the active office. IEEE Pers. Commun. 4(5), 42–47 (1997). OctCrossRef A. Ward, A. Jones, A. Hopper, A new location technique for the active office. IEEE Pers. Commun. 4(5), 42–47 (1997). OctCrossRef
12.
go back to reference L. Girod, M. Lukac, V. Trifa, D. Estrin, The design and implementation of a self-calibrating acoustic sensing platform, in Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), 2006, pp. 71–84 L. Girod, M. Lukac, V. Trifa, D. Estrin, The design and implementation of a self-calibrating acoustic sensing platform, in Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), 2006, pp. 71–84
13.
go back to reference P.J. Rousseeuw, A.M. Leroy, Robust Regression and Outlier Detection (Wiley-Interscience, New York, 2003). September P.J. Rousseeuw, A.M. Leroy, Robust Regression and Outlier Detection (Wiley-Interscience, New York, 2003). September
14.
go back to reference R. Yarlagadda, I. Ali, N. Al-Dhahir, J. Hershey, GPS GDOP metric, in IEE Proceedings on Radar, Sonar, and Navigation, 2000, pp. 259–264 R. Yarlagadda, I. Ali, N. Al-Dhahir, J. Hershey, GPS GDOP metric, in IEE Proceedings on Radar, Sonar, and Navigation, 2000, pp. 259–264
Metadata
Title
Localization Attacks and Countermeasures
Authors
Jessica Feng Sanford
Miodrag Potkonjak
Sasha Slijepcevic
Copyright Year
2012
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1839-9_7