Issue No. 06 - June (2010 vol. 9)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2010.20
Murtuza Jadliwala , Ecole Polytechnique Fédérale de Lausanne, Lausanne
Sheng Zhong , State University of New York at Buffalo, Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo, Buffalo
Chunming Qiao , State University of New York at Buffalo, Buffalo
Jean-Pierre Hubaux , Ecole Polytechnique Fédérale de Lausanne, Lausanne
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain unaddressed: In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded error during a two-dimensional distance-based location estimation? Under these necessary and sufficient conditions, what class of localization algorithms can provide this error bound? In this paper, we attempt to answer these and other related questions by following a careful analytical approach. Specifically, we first show that when the number of cheating beacon nodes is greater than or equal to a given threshold, there do not exist any two-dimensional distance-based localization algorithms that can guarantee a bounded error. Furthermore, when the number of cheating beacons is below this threshold, we identify a class of distance-based localization algorithms that can always guarantee a bounded localization error. Finally, we outline three novel distance-based localization algorithms that belong to this class of bounded error localization algorithms. We verify their accuracy and efficiency by means of extensive simulation experiments using both simple and practical distance estimation error models.
Wireless networks, distance-based localization, security.
J. Hubaux, S. Upadhyaya, C. Qiao, S. Zhong and M. Jadliwala, "Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes," in IEEE Transactions on Mobile Computing, vol. 9, no. , pp. 810-823, 2010.