Enhancing the Robustness and Security of Localization Schemes Through Effective Location Verification in Wireless Sensor Networks

Enhancing the Robustness and Security of Localization Schemes Through Effective Location Verification in Wireless Sensor Networks
Author: Dawood Al-Abri
Publisher:
Total Pages:
Release: 2008
Genre:
ISBN:


Download Enhancing the Robustness and Security of Localization Schemes Through Effective Location Verification in Wireless Sensor Networks Book in PDF, Epub and Kindle

In addition, we perform a security analysis on the proposed scheme to assess its robustness to various attacks that may hinder the protocol operation. Our results show that a high coverage could be achieved using a relatively small number of verifiers. Moreover, we demonstrate that the proposed protocol is robust against location spoofing attacks. Then, we study how to schedule the verification service, and propose a scheduling scheme based on random access. Results show a high service throughput while maintaining a reasonable response delay its performance is better than TDMA-like clustering-based schemes when the interference between clusters is taken into account. We then turn our attention to study the problem of the impact of localization error on the performance of location verification. We examine how our proposed CORVA protocol with respect to how the verification probability varies with error parameters. We also present an abstract model to study the problem in a more general setting. Based on the proposed model, we analyze four combinations of localization and location verification schemes. Our study indicates that an effective verification protocol must have a built-in mechanism to handle effectively the localization error present in most practical localization schemes. Finally, we focus on exploiting the location verification as a feedback mechanism to improve the localization accuracy. We propose several novel location verification feedback (LV-FEED) algorithms to improve the localization accuracy. Analysis of these algorithms shows that a significant improvement in localization accuracy can be accomplished in a few iterations of executing the location verification feedback schemes.


Enhancing the Robustness and Security of Localization Schemes Through Effective Location Verification in Wireless Sensor Networks
Language: en
Pages:
Authors: Dawood Al-Abri
Categories:
Type: BOOK - Published: 2008 - Publisher:

GET EBOOK

In addition, we perform a security analysis on the proposed scheme to assess its robustness to various attacks that may hinder the protocol operation. Our resul
Security and Robustness of Localization Techniques for Emergency Sensor Networks
Language: en
Pages: 170
Authors: Murtuza Shabbir Jadliwala
Categories:
Type: BOOK - Published: 2008 - Publisher:

GET EBOOK

Recent advancement in radio and processor technology has seen the rise of Wireless Sensor Networks (WSN) as a reliable and cost-effective tool for real-time inf
Localization Algorithms and Strategies for Wireless Sensor Networks: Monitoring and Surveillance Techniques for Target Tracking
Language: en
Pages: 526
Authors: Mao, Guoqiang
Categories: Computers
Type: BOOK - Published: 2009-05-31 - Publisher: IGI Global

GET EBOOK

Wireless localization techniques are an area that has attracted interest from both industry and academia, with self-localization capability providing a highly d
Localization in Wireless Networks
Language: en
Pages: 207
Authors: Jessica Feng Sanford
Categories: Technology & Engineering
Type: BOOK - Published: 2012-05-03 - Publisher: Springer Science & Business Media

GET EBOOK

In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recogni
Localization in Wireless Sensor Networks
Language: en
Pages: 0
Authors: Mark Terwilliger (Computer scientist)
Categories: Sensor networks
Type: BOOK - Published: 2006 - Publisher:

GET EBOOK

With the proliferation of wireless sensor networks, providing location-aware technology and services to new applications have become important for developers. L