Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/4384
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorChen, H-
dc.creatorLou, W-
dc.creatorWang, Z-
dc.date.accessioned2014-12-11T08:23:55Z-
dc.date.available2014-12-11T08:23:55Z-
dc.identifier.isbn978-1-4244-9330-2-
dc.identifier.issn1097-2641-
dc.identifier.urihttp://hdl.handle.net/10397/4384-
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.rights© 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.subjectCryptographyen_US
dc.subjectDistance measurementen_US
dc.subjectMaximum likelihood estimationen_US
dc.subjectSensor systemsen_US
dc.subjectWireless sensor networksen_US
dc.titleSecure localization against wormhole attacks using conflicting setsen_US
dc.typeConference Paperen_US
dc.identifier.doi10.1109/PCCC.2010.5682340-
dcterms.abstractThe wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link to another point. Such kind of attack can cause severe problems in wireless sensor networks, especially deteriorate the routing process and the localization process. In this paper, we propose a secure localization scheme against wormhole attacks, which includes three phases: wormhole attack detection, neighboring locators differentiation and secure localization. The main idea of the proposed secure localization scheme is to build a so-called conflicting set for each locator according to the abnormalities of message exchanges among neighboring locators, which is used to differentiate the dubious locators from valid locators for the secure localization. The simulation results show that the proposed scheme outperforms the existed schemes under different network parameters.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIPCCC 2010 : 29th IEEE International Performance Computing and Communications Conference : proceedings, 9-11 December 2010, Albuquerque, NM, USA, p. 25-33-
dcterms.issued2010-
dc.identifier.isiWOS:000287967200004-
dc.identifier.scopus2-s2.0-79551528404-
dc.identifier.rosgroupidr52098-
dc.description.ros2010-2011 > Academic research: refereed > Refereed conference paper-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberOA_IR/PIRAen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
ipccc2010b.pdfPre-published version275.66 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

151
Last Week
1
Last month
Citations as of Mar 24, 2024

Downloads

147
Citations as of Mar 24, 2024

SCOPUSTM   
Citations

10
Last Week
0
Last month
0
Citations as of Mar 28, 2024

WEB OF SCIENCETM
Citations

3
Last Week
0
Last month
0
Citations as of Mar 28, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.