Secure localization and authentication in ultra-wideband sensor networks

被引:114
作者
Zhang, YC [1 ]
Liu, W
Fang, YG
Wu, DP
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Scalable Network Technol, Los Angeles, CA 90045 USA
基金
美国国家科学基金会;
关键词
authentication; localization; security; sensor networks; ultra-wideband (UWB);
D O I
10.1109/JSAC.2005.863855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the important application areas of UWB is wireless sensor networks. The proper operations of many UWB sensor networks rely on the knowledge of physical sensor locations. However, most existing localization algorithms developed for sensor networks are vulnerable to attacks in hostile environments. As a result, attackers can easily subvert the normal functionalities of location-dependent sensor networks by exploiting the weakness of localization algorithms. In this paper, we first analyze the security of existing localization techniques. We then develop a mobility-assisted secure localization scheme for UWB sensor networks. In addition, we propose a location-based scheme to enable secure authentication in UWB sensor networks.
引用
收藏
页码:829 / 835
页数:7
相关论文
共 21 条
[1]  
[Anonymous], 2004, MOBICOM 04
[2]  
[Anonymous], 2004, Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks-SASN '04
[3]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[4]  
BONEH D, 2001, LNCS, V2139
[5]  
BRANDS S, 1993, THEORY APPL CRYPTOGR, P344
[6]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[7]  
CHAN H, 2006, IEEE J SEL AREA COMM, V24, P247
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]  
Cheng XZ, 2004, IEEE INFOCOM SER, P2685
[10]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]