TY - GEN
T1 - Security enhancing compiler for localization schemes in pervasive sensor networks
AU - Chun, Ji Young
AU - Kim, Yong Ho
AU - Hwang, Jung Yeon
AU - Lee, Dong Hoon
PY - 2009
Y1 - 2009
N2 - Localization is one of the important issues in pervasive sensor networks. Extensive techniques have been proposed recently to make efficient localization schemes. Most existing localization schemes utilize some powerful nodes (called anchor nodes) which can discover their own locations through GPS or manual configuration, and then provide the location information of other sensor nodes. However, since most of these localization schemes have been studied in non-adversarial settings, these schemes are vulnerable to malicious attacks, especially, when anchor nodes are compromised. In this paper, we propose a general compiler that transforms the localization schemes in nonadversarial settings to the localization schemes secure against malicious attacks. This compiler is very useful in that it can cover not only the existing localization schemes but also the new schemes that will be proposed. Moreover, our proposed compiler also supports key management method between sensor nodes and anchor nodes. Therefore, there is no necessity for assuming that each sensor node already has pair-wise key with anchor node.
AB - Localization is one of the important issues in pervasive sensor networks. Extensive techniques have been proposed recently to make efficient localization schemes. Most existing localization schemes utilize some powerful nodes (called anchor nodes) which can discover their own locations through GPS or manual configuration, and then provide the location information of other sensor nodes. However, since most of these localization schemes have been studied in non-adversarial settings, these schemes are vulnerable to malicious attacks, especially, when anchor nodes are compromised. In this paper, we propose a general compiler that transforms the localization schemes in nonadversarial settings to the localization schemes secure against malicious attacks. This compiler is very useful in that it can cover not only the existing localization schemes but also the new schemes that will be proposed. Moreover, our proposed compiler also supports key management method between sensor nodes and anchor nodes. Therefore, there is no necessity for assuming that each sensor node already has pair-wise key with anchor node.
UR - http://www.scopus.com/inward/record.url?scp=70350714656&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350714656&partnerID=8YFLogxK
U2 - 10.1109/ICIS.2009.196
DO - 10.1109/ICIS.2009.196
M3 - Conference contribution
AN - SCOPUS:70350714656
SN - 9780769536415
T3 - Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
SP - 307
EP - 312
BT - Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
T2 - 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Y2 - 1 June 2009 through 3 June 2009
ER -