Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received sig...
Main Authors: | , , , |
---|---|
Format: | Journal article |
Published: |
2008
|
_version_ | 1797079333106352128 |
---|---|
author | Čapkun, S Rasmussen, K Čagalj, M Srivastava, M |
author_facet | Čapkun, S Rasmussen, K Čagalj, M Srivastava, M |
author_sort | Čapkun, S |
collection | OXFORD |
description | In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad-hoc and sensor networks. |
first_indexed | 2024-03-07T00:44:21Z |
format | Journal article |
id | oxford-uuid:841aa25c-a462-4ff8-96e0-397b89d40d44 |
institution | University of Oxford |
last_indexed | 2024-03-07T00:44:21Z |
publishDate | 2008 |
record_format | dspace |
spelling | oxford-uuid:841aa25c-a462-4ff8-96e0-397b89d40d442022-03-26T21:48:53ZSecure Location Verification with Hidden and Mobile Base StationsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:841aa25c-a462-4ff8-96e0-397b89d40d44Department of Computer Science2008Čapkun, SRasmussen, KČagalj, MSrivastava, MIn this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad-hoc and sensor networks. |
spellingShingle | Čapkun, S Rasmussen, K Čagalj, M Srivastava, M Secure Location Verification with Hidden and Mobile Base Stations |
title | Secure Location Verification with Hidden and Mobile Base Stations |
title_full | Secure Location Verification with Hidden and Mobile Base Stations |
title_fullStr | Secure Location Verification with Hidden and Mobile Base Stations |
title_full_unstemmed | Secure Location Verification with Hidden and Mobile Base Stations |
title_short | Secure Location Verification with Hidden and Mobile Base Stations |
title_sort | secure location verification with hidden and mobile base stations |
work_keys_str_mv | AT capkuns securelocationverificationwithhiddenandmobilebasestations AT rasmussenk securelocationverificationwithhiddenandmobilebasestations AT cagaljm securelocationverificationwithhiddenandmobilebasestations AT srivastavam securelocationverificationwithhiddenandmobilebasestations |