In a decentralized sensor network, localization process relies on the integrity of participating sensors. Existence of malicious beacon nodes in the vicinity of non-beacon nodes affects this process. This paper presents a trilateration-based secure localization technique, which is capable of estimating the location of a sensor with high accuracy so long four neighbouring beacon nodes are benign, irrespective of the number of neighbouring liars and without assuming any trust model. In realistic scenarios of wireless environment where transmitted signals attenuate randomly due to fading, the liar-tolerance level of this attack-resistant technique has to be relaxed accordingly. Superiority of this technique against the state-of-the-art has bee...
Localization, in the form of pin-pointing a randomly deployed sensor using location-aware anchors be...
Abstract — In this paper we address the problem of robustly estimating the position of randomly depl...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
Abstract — Many sensor applications are being developed that require the location of wireless device...
Rapid technological advances have enabled the development of low-cost sensor networks for various mo...
Many sensor network applications require sensors’ locations to function correctly. Despite the recen...
We provide in this paper three algorithms that enable the sensor nodes of a Wireless Sensor Network ...
This paper proposes a new algorithm to find and isolate the nodes which lies about their position in...
Localization is a concerning issue in the applications of wireless sensor networks. Along with the a...
ABSTRACT This paper proposes a new algorithm to find and isolate the nodes which lies about their po...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
Abstract — Wireless sensor networks (WSN) have recently shown many potential military and civilian a...
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee t...
Localization, in the form of pin-pointing a randomly deployed sensor using location-aware anchors be...
Abstract — In this paper we address the problem of robustly estimating the position of randomly depl...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
Abstract — Many sensor applications are being developed that require the location of wireless device...
Rapid technological advances have enabled the development of low-cost sensor networks for various mo...
Many sensor network applications require sensors’ locations to function correctly. Despite the recen...
We provide in this paper three algorithms that enable the sensor nodes of a Wireless Sensor Network ...
This paper proposes a new algorithm to find and isolate the nodes which lies about their position in...
Localization is a concerning issue in the applications of wireless sensor networks. Along with the a...
ABSTRACT This paper proposes a new algorithm to find and isolate the nodes which lies about their po...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
Abstract — Wireless sensor networks (WSN) have recently shown many potential military and civilian a...
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee t...
Localization, in the form of pin-pointing a randomly deployed sensor using location-aware anchors be...
Abstract — In this paper we address the problem of robustly estimating the position of randomly depl...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...