Research Article
How Secure are Secure Localization Protocols in WSNs?
618 downloads
@INPROCEEDINGS{10.1007/978-3-642-23583-2_12, author={Ch\^{e}rifa Boucetta and Mohamed Kaafar and Marine Minier}, title={How Secure are Secure Localization Protocols in WSNs?}, proceedings={Sensor Systems and Software. Second International ICST Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers}, proceedings_a={S-CUBE}, year={2012}, month={5}, keywords={}, doi={10.1007/978-3-642-23583-2_12} }
- Chérifa Boucetta
Mohamed Kaafar
Marine Minier
Year: 2012
How Secure are Secure Localization Protocols in WSNs?
S-CUBE
Springer
DOI: 10.1007/978-3-642-23583-2_12
Abstract
Remote monitoring and gathering information are the main objectives behind deploying Wireless Sensor Networks (WSNs). Besides WSN issues due to communication and computation restricted resources (low energy, limited memory computational speed and bandwidth), securing sensor networks is one of the major challenges these networks have to face. In particular, the security of sensors localization is a fundamental building block for many applications such as efficient routing.
Copyright © 2010–2024 ICST