Secure localization and time synchronization for wireless sensor and ad hoc networks

Author(s)

    • Poovendran, Radha
    • Wang, Cliff
    • Roy, Sumit

Bibliographic Information

Secure localization and time synchronization for wireless sensor and ad hoc networks

edited by Rhadha Poovendran, Cliff Wang, Sumit Roy

(Advances in information security, 30)

Springer, c2007

Available at  / 2 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The book will also interest developers of secure wireless systems.

Table of Contents

Localization Techniques.- Range-Free Localization.- A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks.- Learning Sensor Location from Signal Strength and Connectivity.- Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks.- Experiences from the Empirical Evaluation of Two Physical Layers for Node Localization.- Secure Localization.- Robust Wireless Localization: Attacks and Defenses.- Secure and Resilient Localization in Wireless Sensor Networks.- Secure Localization for Wireless Sensor Networks using Range-Independent Methods.- TRaVarSeL-Transmission Range Variation based Secure Localization.- Secure Sequence-based Localization for Wireless Networks.- Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations).- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.- Location Privacy in Wireless LAN.- Secure Time Synchronization.- Time Synchronization Attacks in Sensor Networks.- Secure and Resilient Time Synchronization in Wireless Sensor Networks.- Securing Timing Synchronization in Sensor Networks.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top