Sensor Systems and Software. Second International ICST Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers

Research Article

How Secure are Secure Localization Protocols in WSNs?

Download
611 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23583-2_12,
        author={Ch\^{e}rifa Boucetta and Mohamed Kaafar and Marine Minier},
        title={How Secure are Secure Localization Protocols in WSNs?},
        proceedings={Sensor Systems and Software. Second International ICST Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers},
        proceedings_a={S-CUBE},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-23583-2_12}
    }
    
  • Chérifa Boucetta
    Mohamed Kaafar
    Marine Minier
    Year: 2012
    How Secure are Secure Localization Protocols in WSNs?
    S-CUBE
    Springer
    DOI: 10.1007/978-3-642-23583-2_12
Chérifa Boucetta1, Mohamed Kaafar1, Marine Minier1
  • 1: INRIA

Abstract

Remote monitoring and gathering information are the main objectives behind deploying Wireless Sensor Networks (WSNs). Besides WSN issues due to communication and computation restricted resources (low energy, limited memory computational speed and bandwidth), securing sensor networks is one of the major challenges these networks have to face. In particular, the security of sensors localization is a fundamental building block for many applications such as efficient routing.