Secure Location Verification with Hidden and Mobile Base Stations

In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received sig...

Full description

Bibliographic Details
Main Authors: Čapkun, S, Rasmussen, K, Čagalj, M, Srivastava, M
Format: Journal article
Published: 2008
_version_ 1797079333106352128
author Čapkun, S
Rasmussen, K
Čagalj, M
Srivastava, M
author_facet Čapkun, S
Rasmussen, K
Čagalj, M
Srivastava, M
author_sort Čapkun, S
collection OXFORD
description In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad-hoc and sensor networks.
first_indexed 2024-03-07T00:44:21Z
format Journal article
id oxford-uuid:841aa25c-a462-4ff8-96e0-397b89d40d44
institution University of Oxford
last_indexed 2024-03-07T00:44:21Z
publishDate 2008
record_format dspace
spelling oxford-uuid:841aa25c-a462-4ff8-96e0-397b89d40d442022-03-26T21:48:53ZSecure Location Verification with Hidden and Mobile Base StationsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:841aa25c-a462-4ff8-96e0-397b89d40d44Department of Computer Science2008Čapkun, SRasmussen, KČagalj, MSrivastava, MIn this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad-hoc and sensor networks.
spellingShingle Čapkun, S
Rasmussen, K
Čagalj, M
Srivastava, M
Secure Location Verification with Hidden and Mobile Base Stations
title Secure Location Verification with Hidden and Mobile Base Stations
title_full Secure Location Verification with Hidden and Mobile Base Stations
title_fullStr Secure Location Verification with Hidden and Mobile Base Stations
title_full_unstemmed Secure Location Verification with Hidden and Mobile Base Stations
title_short Secure Location Verification with Hidden and Mobile Base Stations
title_sort secure location verification with hidden and mobile base stations
work_keys_str_mv AT capkuns securelocationverificationwithhiddenandmobilebasestations
AT rasmussenk securelocationverificationwithhiddenandmobilebasestations
AT cagaljm securelocationverificationwithhiddenandmobilebasestations
AT srivastavam securelocationverificationwithhiddenandmobilebasestations