Security enhancing compiler for localization schemes in pervasive sensor networks

Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Localization is one of the important issues in pervasive sensor networks. Extensive techniques have been proposed recently to make efficient localization schemes. Most existing localization schemes utilize some powerful nodes (called anchor nodes) which can discover their own locations through GPS or manual configuration, and then provide the location information of other sensor nodes. However, since most of these localization schemes have been studied in non-adversarial settings, these schemes are vulnerable to malicious attacks, especially, when anchor nodes are compromised. In this paper, we propose a general compiler that transforms the localization schemes in nonadversarial settings to the localization schemes secure against malicious attacks. This compiler is very useful in that it can cover not only the existing localization schemes but also the new schemes that will be proposed. Moreover, our proposed compiler also supports key management method between sensor nodes and anchor nodes. Therefore, there is no necessity for assuming that each sensor node already has pair-wise key with anchor node.

Original languageEnglish
Title of host publicationProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Pages307-312
Number of pages6
DOIs
Publication statusPublished - 2009
Event8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009 - Shanghai, China
Duration: 2009 Jun 12009 Jun 3

Publication series

NameProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009

Other

Other8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Country/TerritoryChina
CityShanghai
Period09/6/109/6/3

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Security enhancing compiler for localization schemes in pervasive sensor networks'. Together they form a unique fingerprint.

Cite this