By Topic

Secure localization algorithms for wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

In the military and emergency preparedness class of applications, wireless sensor networks have a number of desirable characteristics, such as being autonomous systems that can be deployed in a remote - possibly hostile - environment and can perform tasks like battlefield surveillance or enemy tracking, as well as monitor the security of military facilities. One of the main challenges in this kind of application is security. Due to their key role in WSNs and also their fragility, localization systems can be the target of an attack that could compromise the entire functioning of a WSN and lead to incorrect military plans and decision making, among other problems. In this article we show how current localization systems are vulnerable to these security attacks, and how existing techniques can be used to prevent or impede these attacks in WSNs.

Published in:

Communications Magazine, IEEE  (Volume:46 ,  Issue: 4 )