{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:12:58Z","timestamp":1769638378612,"version":"3.49.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0430223CNS-0430252"],"award-info":[{"award-number":["CNS-0430223CNS-0430252"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-04-D-0003-0001"],"award-info":[{"award-number":["W911NF-04-D-0003-0001"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>\n                    Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in\n                    <jats:italic toggle=\"yes\">hostile environments<\/jats:italic>\n                    has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This article presents two methods to tolerate malicious attacks against range-based location discovery in sensor networks. The first method filters out malicious beacon signals on the basis of the \u201cconsistency\u201d among multiple beacon signals, while the second method tolerates malicious beacon signals by adopting an iteratively refined voting scheme. Both methods can survive malicious attacks even if the attacks bypass authentication, provided that the benign beacon signals constitute the majority of the beacon signals. This article also presents the implementation and experimental evaluation (through both field experiments and simulation) of all the secure and resilient location estimation schemes that can be used on the current generation of sensor platforms (e.g., MICA series of motes), including the techniques proposed in this article, in a network of MICAz motes. The experimental results demonstrate the effectiveness of the proposed methods, and also give the secure and resilient location estimation scheme most suitable for the current generation of sensor networks.\n                  <\/jats:p>","DOI":"10.1145\/1380564.1380570","type":"journal-article","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T09:35:10Z","timestamp":1217928910000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Attack-Resistant Location Estimation in Wireless Sensor Networks"],"prefix":"10.1145","volume":"11","author":[{"given":"Donggang","family":"Liu","sequence":"first","affiliation":[{"name":"The University of Texas at Arlington"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"An","family":"Liu","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Cliff","family":"Wang","sequence":"additional","affiliation":[{"name":"Army Research Office"}]},{"given":"Wenliang Kevin","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University"}]}],"member":"320","published-online":{"date-parts":[[2008,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Bulusu N. Heidemann J. and Estrin D. 2000. GPS-less low cost outdoor localization for very small devices. In IEEE Personal Communications Magazine. 28--34.","DOI":"10.1109\/98.878533"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05)","author":"Capkun S.","unstructured":"Capkun, S. and Hubaux, J. 2005. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05) ."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830566"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'01)","author":"Doherty L.","unstructured":"Doherty, L., Pister, K. S., and Ghaoui, L. E. 2001. Convex optimization methods for sensor node position estimation. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'01)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.267"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/977406.978703"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Hill J. Szewczyk R. Woo A. Hollar S. Culler D. and Pister K. S. J. 2000. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems. 93--104. 10.1145\/378993.379006","DOI":"10.1145\/378993.379006"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/827275.829375"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'03)","author":"Hu Y.","unstructured":"Hu, Y., Perrig, A., and Johnson, D. 2003. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'03)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03)","author":"Karlof C.","unstructured":"Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147738"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077391.1077395"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147703"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147704"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.21"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765991.1766014"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570754"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958501"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'01)","author":"Niculescu D.","unstructured":"Niculescu, D. and Nath, B. 2001. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'01)."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society (INFOCOM'03)","author":"Niculescu D.","unstructured":"Niculescu, D. and Nath, B. 2003a. Ad hoc positioning system (APS) using AoA. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society (INFOCOM'03). 1734--1743."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023403323460"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570750"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society (INFOCOM'03)","author":"Ray S.","unstructured":"Ray, S., Ungrangsi, R., Pellegrini, F. D., Trachtenberg, A., and Starobinski, D. 2003. Robust location detection in emergency sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society (INFOCOM'03)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570755"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 1st ACM Workshop on Hot Topics in Networks (HotNets-I).","author":"Shenker S.","unstructured":"Shenker, S., Ratnasamy, S., Karp, B., Govindan, R., and Estrin, D. 2002. Data-centric storage in sensornets. In Proceedings of the 1st ACM Workshop on Hot Topics in Networks (HotNets-I)."},{"key":"e_1_2_1_41_1","volume-title":"Tech. Rep. UCLA\/CSD-TR-01-0023, UCLA, Department of Computer Science. May.","author":"Yu Y.","year":"2001","unstructured":"Yu, Y., Govindan, R., and Estrin, D. 2001. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Tech. Rep. UCLA\/CSD-TR-01-0023, UCLA, Department of Computer Science. May."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380570","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1380564.1380570","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1380564.1380570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:36:21Z","timestamp":1763458581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1380564.1380570"],"URL":"https:\/\/doi.org\/10.1145\/1380564.1380570","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2005-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}