The Community for Technology Leaders
Green Image
Issue No. 06 - June (2010 vol. 9)
ISSN: 1536-1233
pp: 810-823
Jean-Pierre Hubaux , Ecole Polytechnique Fédérale de Lausanne, Lausanne
Shambhu Upadhyaya , State University of New York at Buffalo, Buffalo
Chunming Qiao , State University of New York at Buffalo, Buffalo
Sheng Zhong , State University of New York at Buffalo, Buffalo
Murtuza Jadliwala , Ecole Polytechnique Fédérale de Lausanne, Lausanne
ABSTRACT
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain unaddressed: In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded error during a two-dimensional distance-based location estimation? Under these necessary and sufficient conditions, what class of localization algorithms can provide this error bound? In this paper, we attempt to answer these and other related questions by following a careful analytical approach. Specifically, we first show that when the number of cheating beacon nodes is greater than or equal to a given threshold, there do not exist any two-dimensional distance-based localization algorithms that can guarantee a bounded error. Furthermore, when the number of cheating beacons is below this threshold, we identify a class of distance-based localization algorithms that can always guarantee a bounded localization error. Finally, we outline three novel distance-based localization algorithms that belong to this class of bounded error localization algorithms. We verify their accuracy and efficiency by means of extensive simulation experiments using both simple and practical distance estimation error models.
INDEX TERMS
Wireless networks, distance-based localization, security.
CITATION
Jean-Pierre Hubaux, Shambhu Upadhyaya, Chunming Qiao, Sheng Zhong, Murtuza Jadliwala, "Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes", IEEE Transactions on Mobile Computing, vol. 9, no. , pp. 810-823, June 2010, doi:10.1109/TMC.2010.20
100 ms
(Ver )