A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Attack-tolerant localization via iterative verification of locations in sensor networks
2008
ACM Transactions on Embedded Computing Systems
In sensor networks, secure localization-determining sensors' locations in a hostile, untrusted environment-is a challenging, but very important, problem that has not yet been addressed effectively. This paper presents an attack-tolerant localization protocol, called Verification for Iterative Localization (VeIL), under which sensors cooperatively safeguard the localization service. By exploiting the high spatiotemporal correlation existing between adjacent nodes, VeIL realizes (a) adaptive
doi:10.1145/1457246.1457248
fatcat:yligvwgc25fwdd42j2h3akpbg4