Open Access Open Access  Restricted Access Subscription or Fee Access

Secure and Robust Localization in Wireless Network Protection

S. Jagadeesan

Abstract


Measures adopted to prevent the unauthorized use; misuse, modifications, or denial of    use of knowledge, facts, data, or capabilities in the network is called Network security.  Security is defined as freedom from danger, safety; freedom from fear or anxiety. Security continues to be an issue for organizations. This presentation describes about the network on wireless technologies and the need of securing it. It explains various techniques (attacks) that are adopted by the hackers to destroy the network. It throws light over the most efficient techniques used to secure the network from unauthorized persons.

 The main problem related to network security evaluation criteria is the lack of a network understanding. When computers are networked together, new security problems occur and old problems behave in different ways. To solve all these kinds of problems, the technologies have been evolved in these years, which had shown a marvelous improvement in network security. Communications and emissions security were sufficient when Teletype sent messages. Networking and web technologies have evolved which made a wonderful and mass change in the computer field.  The information on the web became accessible to anyone who had access to the web. This gave rise to the need for network security.


Keywords


Wireless Local Area Networks, Global Positioning System, Ad Hoc Networks, Connection less Networks, Line of Sight, Wired Networks, and Structured Networks.

Full Text:

PDF

References


Y. Zhang, W. Liu, Y. Fang, and D. Wu, “Secure localization and authentication in ultra-wideband sensor networks, in IEEE Journal on Selected Areas in Communication vol. 24, no. 4, 2006, pp. 829–835.

D. He, L. Cui, and H. Huang, “Design and verification of enhanced secure localization scheme in wireless sensor networks,” in IEEE transactions on Parallel and Distributed Systems , vol. 20, no. 7, July 2009.

S.Arisar and A. Kemp, “Secure location estimation in large scale wireless sensor networks,” in Proceedings of the 3rd International Conference on Next Generation Mobile Applications, Services and Technologies , 2009, pp. 472–476.

J. Alfaro, M. Barbeau, and E. Kranakis, “Secure localization of nodes in wireless sensor networks with limited number of truth tellers,” in Proceedings of the 7th Annual Communications Networks and Services Research Conference, 2009, pp. 86–93.

“Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes,” in Annals of Telecommunications, November 2010, pp. 1–18.

L. Lazos and R. Poovendran, “SeRLoc: Secure range-independent localization for wireless sensor networks,”in Proceedings of the 3rd ACM Workshop on Wireless Security, 2004, pp. 21–30.

“ROPE: robust position estimation in wireless sensor networks,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks,April 2005, pp. 324–331.

“HiRLoc: High-resolution robust localization for wireless sensor networks,” in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 233– 246.

Y. Zeng, S. Zhang, S. Guo, and L. Xie, “Secure hop-count based localization in wireless sensor networks,” in 2007 International Conference on Computational Intelligence and Security , December 2007, pp. 907–911.

P. Rousseeuw and A. Leroy, “Robust regression and outlier detection,” in WileyInterscience, 2003.

E. Ekici, J. Mcnair, and D. Al-Abri, “A probabilistic approach to location verification in wireless sensor net- works,” in IEEE International Conference on Communications , vol. 8, June 2006, pp. 3485–3490.

E. Ekici, S. Vural, J. Mcnair, and D. Al-Abri, “Secure probabilistic location verification in randomly deployed wireless sensor networks,” in Ad Hoc Networks , vol. 6, no. 2, 2008, pp. 195– 209.

J. Wu, H. Chen, W. Lou, Z. Wang, and Z. Wang, “Label- based dv-hop localization against wormhole attacks in wireless sensor networks,” in Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage , September 2010, pp. 79–88.

N. Labraoui and M. Gueroui, “Secure range-free localization scheme in wireless sensor networks,” in Proceedings of the 10th International Symposium on Programming and Systems (ISPS) , April 2011, pp. 1–8.

W. Du, L. Fang, and P. Ning, “LAD: Localization anomaly detection for wireless sensor networks,” in The Journal of Parallel and Distributed Computing , vol. 66, no. 7, 2006,pp. 874–886.

D. Liu, P. Ning, and W. Du, “Detecting malicious beacon nodes for secure location discovery in wireless sensor networks,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems , 2005, pp.609–691.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.