Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. We analyze the optimal players ’ strategy and we show that the VM is indeed a proper mechanism to reduce fake positio...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Wireless sensor networks (WSNs) composed of low-power, low-cost sensor nodes are expected to form th...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
Abstract. Wireless Sensor Networks (WSNs) support data collection and distributed data processing by...
Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Abstract—Most applications of Wireless Sensor Networks (WSNs) rely on data about the positions of se...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Wireless sensor networks (WSNs) composed of low-power, low-cost sensor nodes are expected to form th...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
Abstract. Wireless Sensor Networks (WSNs) support data collection and distributed data processing by...
Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Wireless Sensor Net (WSNs) support data collection and distributed data processing by means of very ...
Abstract—Most applications of Wireless Sensor Networks (WSNs) rely on data about the positions of se...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor node...
Wireless sensor networks (WSNs) composed of low-power, low-cost sensor nodes are expected to form th...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...