Drone path planning for secure positioning and secure position verification

P Perazzo, FB Sorbelli, M Conti, G Dini… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Many dependable systems rely on the integrity of the position of their components. In such
systems, two key problems are secure localization and secure location verification of the …

Lightweight secure localization approach in wireless sensor networks

N Xie, Y Chen, Z Li, DO Wu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper is concerned with the security problem of Time of Arrival (ToA) based localization
schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses …

Efficient Detection of Cooperative External Attacks in Wireless Localization Systems

J Yuan, Y Cai, Y Chen, N Xie, P Zhang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
This paper addresses the critical challenge of securing two-way Time-of-Arrival (ToA)
localization in Wireless Sensor Networks (WSNs) against cooperative distance-enlargement …

Secure positioning in wireless sensor networks through enlargement miscontrol detection

P Perazzo, L Taponecco, AA D'amico… - ACM Transactions on …, 2016 - dl.acm.org
Wireless sensor networks enable a wealth of new applications in areas such as military,
medical, environmental, transportation, smart city, and so on. In many of these scenarios, we …

Modeling enlargement attacks against UWB distance bounding protocols

A Compagno, M Conti, AA D'Amico… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Distance bounding protocols make it possible to determine a trusted upper bound on the
distance between two devices. Their key property is to resist reduction attacks, ie, attacks …

On the feasibility of overshadow enlargement attack on IEEE 802.15. 4a distance bounding

L Taponecco, P Perazzo, AA D'Amico… - IEEE Communications …, 2013 - ieeexplore.ieee.org
Distance-bounding protocols are able to measure a secure upper bound to the distance
between two devices. They are designed to resist to reduction attacks, whose objective is …

Projection-Based Consensus Algorithm for Secure Localization in Ultra-Wideband Sensor Networks

M Wang, C Xu, Q Liu - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Secure localization in sensor networks is a promising research in engineering field. This
paper considers a scene that there exists malicious anchor in the sensor network composed …

Research on the location attack based on multiple counterfeit identities technology in sensor networks

H Shen, XG Ye - 2014 International Conference on Wireless …, 2014 - ieeexplore.ieee.org
Positioning is the foundation of wireless sensor applications. An attack method of multiple
counterfeit identities in sensor network localization is proposed. At different times, attack …

Novel secure positioning method in ultra‐wide band framework based on overshadowing attack probabilistic model

N Orouji, MR Mosavi - IET Communications, 2020 - Wiley Online Library
The extensive use of Internet of things (IoT) devices demonstrates an increasing demand for
secure frameworks. Position altering attacks are amongst the most severe vulnerabilities in …

[PDF][PDF] In-region Location Verification Using Distance Bounding

MMR Akand - 2016 - prism.ucalgary.ca
Location-based services have grown rapidly in recent years. Determining the location of a
service user, however, appears to come with two seemingly contradictory requirements: on …