Abstract | ||
---|---|---|
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain unaddressed: In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded error during a two-dimensional distance-based location estimation? Under these necessary and sufficient conditions, what class of localization algorithms can provide this error bound? In this paper, we attempt to answer these and other related questions by following a careful analytical approach. Specifically, we first show that when the number of cheating beacon nodes is greater than or equal to a given threshold, there do not exist any two-dimensional distance-based localization algorithms that can guarantee a bounded error. Furthermore, when the number of cheating beacons is below this threshold, we identify a class of distance-based localization algorithms that can always guarantee a bounded localization error. Finally, we outline three novel distance-based localization algorithms that belong to this class of bounded error localization algorithms. We verify their accuracy and efficiency by means of extensive simulation experiments using both simple and practical distance estimation error models. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/TMC.2010.20 | IEEE Trans. Mob. Comput. |
Keywords | Field | DocType |
sufficient condition,secure distance-based localization,distance-based localization,index terms—wireless networks,bounded error localization algorithm,cheating beacon,cheating beacon nodes,distance-based localization algorithm,security. ✦,two-dimensional distance-based localization algorithm,beacon node,bounded error,localization algorithm,bounded localization error,protocols,time difference of arrival,indexing terms,sensor network,security,simulation experiment,broadcasting,ad hoc networks,wireless sensor networks,wireless network,mobile computing,wireless networks | Beacon,Mobile computing,Wireless network,Computer science,Computer network,Wireless ad hoc network,Multilateration,Cheating,Wireless sensor network,Bounded function,Distributed computing | Journal |
Volume | Issue | ISSN |
9 | 6 | 1536-1233 |
Citations | PageRank | References |
8 | 0.67 | 25 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Murtuza Jadliwala | 1 | 266 | 25.26 |
Sheng Zhong | 2 | 2019 | 144.16 |
Shambhu J. Upadhyaya | 3 | 781 | 69.61 |
Chunming Qiao | 4 | 3971 | 400.49 |
J. -P. Hubaux | 5 | 10006 | 772.23 |