Browse > Article
http://dx.doi.org/10.5392/JKCA.2020.20.08.359

Classification of Location Verification in WSNs  

Kim, In-hwan (연세대학교 컴퓨터과학과)
Publication Information
Abstract
WSNs as the main technology of IoT often deliver information or authenticate based on location. Thus, verifying location information is essential. This paper aims to present the comprehensive analysis and classification of location verification techniques in WSN. For this, classification criteria are suggested based on the result of feature analysis of existing techniques. In addition, the existing techniques are classified according to the suggested criteria, and each characteristic and development direction are described. The result of this paper is expected to be a useful reference material when designing a new technique.
Keywords
Classification Criteria; Feature Analysis; Location verification; Wireless Sensor Networks; Science Technology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Wei and Y. Guan, "Lightweight Location Verification Algorithms for Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst. Vol.24, No.5, pp.938-950, May. 2013.   DOI
2 P. Perazzo, K. Ariyapala, M. Conti, and G. Dini, "The verifier bee: A path planner for drone-based secure location verification," 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, pp.1-9, 2015.
3 C. Miao, G. Dai, K. Ying, and Q. Chen, "Collaborative Localization and Location Verification in WSNs," Sensors, Vol.15, No.5, pp.10631-10649, May. 2015.   DOI
4 C. Miao, G. Dai, L. Chen, H. Jin, and Q. Chen, "A Node Localization Verification Model for WSN," in Human Centered Computing, vol. 9567, Q. Zu and B. Hu, Eds. Cham: Springer International Publishing, pp.296-309, 2016.
5 J. T. Chiang, J. J. Haas, J. Choi, and Y. C. Hu, "Secure location verification using simultaneous multilateration," IEEE Transactions on Wireless Communications, Vol.11, No.2, pp.584-591, Feb. 2012.   DOI
6 S. Yan, I. Nevat, G. W. Peters, and R. Malaney, "Location verification systems under spatially correlated shadowing," IEEE Transactions on Wireless Communications, Vol.15, No.6, pp.4132-4144, Jun. 2016.   DOI
7 S. Yan, R. Malaney, I. Nevat, and G. W. Peters, "Optimal information theoretic wireless location verification," IEEE Transactions on Vehicular Technology, Vol.63, No.7, pp.3410-3422, Sep. 2014.   DOI
8 D. Wu, D. Zhu, Y. Liu, and D. Zhao, "Location Verification Assisted by a Moving Obstacle for Wireless Sensor Networks," IEEE Internet Things J., Vol.5, No.1, pp.322-335, Feb. 2018.   DOI
9 H. Wang, Y. Wen, and D. Zhao, "Location verification algorithm of wearable sensors for wireless body area networks," Technology and Health Care, Vol.26, No.S1, pp.3-18, Jan. 2018.
10 M. R. Nosouhi, S. Yu, W. Zhou, M. Grobler, and H. Keshtiar, "Blockchain for secure location verification," Journal of Parallel and Distributed Computing, Vol.136, pp.40-51, Feb. 2020.   DOI
11 A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identication and signature problems," In Advances in Cryptology - CRYPTO'86, Vol.263, pp.186-194.
12 S. Brands and D. Chaum, "Distance-Bounding Protocols," in Advances in Cryptology - EUROCRYPT '93, Vol.765, T. Helleseth, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, pp.344-359, 1994.
13 Y. Zeng, J. Cao, J. Hong, S. Zhang, and L. Xie, "Secure localization and location verification in wireless sensor networks: a survey," J Supercomput, Vol.64, No.3, pp.685-701, Jun. 2013.   DOI
14 J. Bachrach and C. Taylor, "Localization in Sensor Networks," Handbook of Sensor Networks: Algorithms and Architectures, pp.277-310, 2005.
15 Adnan Vora and Mikhail Nesterenko, "Secure location verification using radio broadcast," Dependable and Secure Computing, IEEE Transactions on, Vol.3, No.4, pp.377-385, 2006.   DOI
16 L. Borges, F. Velez, and A. Lebres, "Survey on the Characterization and Classification of Wireless Sensor Networks Applications," IEEE Communications Surveys & Tutorials, Vol.16, No.4, pp.1860-1890, 2014.   DOI
17 K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, Vol.3, No.3, pp.325-349, 2005.   DOI
18 J. Jiang, G. Han, C. Zhu, Y. Dong, and N. Zhang, "Secure Localization in Wireless Sensor Networks: A Survey (Invited Paper)," JCM, Vol.6, No.6, pp.460-470, Sep. 2011.
19 U.S. a Department Of Defense, "Global Positioning System Standard Positioning Service," Www.Gps.Gov, No.September, pp.1-160, 2008.
20 A. Srinivasan and J. Wu, "A Survey on Secure Localization in Wireless Sensor Networks," CRC Press, Taylor and Francis Group: Florida, USA, p.26, Oct. 2017.
21 M. S. Chebli, H. Mohammad, and K. A. Amer, "An Overview of Wireless Indoor Positioning Systems: Techniques, Security, and Countermeasures," in Internet and Distributed Computing Systems, Cham, pp.223-233, 2019.
22 N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in Proceedings of the 2nd ACM workshop on Wireless security. ACM, pp.1-10, 2003.
23 S. Capkun and J. P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., Miami, FL, USA, Vol.3, pp.1917-1928, 2005.
24 W. Du, L. Fang, and P. Ning, "LAD: Localization anomaly detection for wireless sensor networks," in Parallel and Distributed Processing Symposium, 2005, Proceedings, 19th IEEE International. IEEE, pp.41a-41a, 2005.
25 J. Hwang, T. He, and Y. Kim, "Detecting Phantom Nodes in Wireless Sensor Networks," in IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, pp.2391-2395, 2007.
26 E. Ekici, S. Vural, J. McNair, and D. Al-Abri, "Secure probabilistic location verification in randomly deployed wireless sensor networks," Ad Hoc Networks, Vol.6, No.2, pp.195-209, Apr. 2008   DOI