Cart (Loading....) | Create Account
Close category search window
 

Secure and Robust Localization in a Wireless Ad Hoc Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Misra, S. ; Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ ; Guoliang Xue ; Bhardwaj, S.

We study the problem of accurate localization of static or mobile nodes in a wireless ad hoc network using the distance estimates of a group of untrusted anchors within the communication range of the nodes. Some of the anchors may be malicious and may independently lie about the distance estimate. The malicious anchors may also collude to lie about the distance estimates. In both cases, accurate node localization may be seriously undermined. We propose a scheme that performs accurate localization of the nodes in the network despite the presence of such malicious anchors. We also show how to identify most of these malicious anchors. In the case where measurements are error free, we derive a critical threshold B for the number of malicious anchors that can be tolerated in the localization process without undermining accuracy. We also show how to correctly localize a node and identify all the malicious anchors in this setting. In the presence of measurement errors, we propose a convex optimization-based localization scheme that can accurately localize a node, as long as the number of malicious anchors in its communication range is no more than B. Simulation results show that our schemes are very effective. When the measurements are error prone and the number of malicious anchors is no more than B , our scheme localizes a node with an error less than 8% and is also able to identify a significant number of malicious anchors. Our schemes guarantee that a true anchor is not identified as malicious.

Published in:

Vehicular Technology, IEEE Transactions on  (Volume:58 ,  Issue: 3 )

Date of Publication:

March 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.