Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/6049
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Chen, H | - |
dc.creator | Lou, W | - |
dc.creator | Sun, X | - |
dc.creator | Wang, Z | - |
dc.date.accessioned | 2014-12-11T08:28:06Z | - |
dc.date.available | 2014-12-11T08:28:06Z | - |
dc.identifier.issn | 1687-1472 | - |
dc.identifier.uri | http://hdl.handle.net/10397/6049 | - |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.rights | © 2010 The Author(s). This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | en_US |
dc.subject | Telecommunication security | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.title | A secure localization approach against wormhole attacks using distance consistency | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 11 | - |
dc.identifier.volume | 2010 | - |
dc.identifier.doi | 10.1155/2010/627039 | - |
dcterms.abstract | Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | EURASIP journal on wireless communications and networking, 11 Nov. 2009, v. 2010, 627039, p. 1-11 | - |
dcterms.isPartOf | EURASIP journal on wireless communications and networking | - |
dcterms.issued | 2009-11-11 | - |
dc.identifier.isi | WOS:000273491300001 | - |
dc.identifier.scopus | 2-s2.0-80052648287 | - |
dc.identifier.eissn | 1687-1499 | - |
dc.identifier.rosgroupid | r49555 | - |
dc.description.ros | 2009-2010 > Academic research: refereed > Publication in refereed journal | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_IR/PIRA | en_US |
dc.description.pubStatus | Published | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Chen_Secure_Localization_Wormhole.pdf | 869.53 kB | Adobe PDF | View/Open |
Page views
259
Last Week
2
2
Last month
Citations as of Mar 24, 2024
Downloads
159
Citations as of Mar 24, 2024
SCOPUSTM
Citations
33
Last Week
0
0
Last month
0
0
Citations as of Mar 28, 2024
WEB OF SCIENCETM
Citations
1
Last Week
0
0
Last month
0
0
Citations as of Mar 28, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.