Secure Location Verification Using Localization Algorithms

Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Security
Format: PDF
The information of sensors' locations is vital data for numerous requisitions in Wireless Sensor Networks (WSNs). The point when sensor hubs are deployed in adversary environments, the localization designs are susceptible to various attacks, e.g., wormhole, pollution, range enlargement attack, and etc. Therefore, sensors' locations are not dependable and need to be verified before they can be used by location-predicated applications. Earlier verification schemes either need group-based deployment knowledge of the sensor field, or rely upon expensive or dedicated hardware, so they cannot be used for low-cost sensor networks.

Find By Topic