Location Verification Systems in Emerging Location Verification Systems in Emerging Wireless Networks Wireless Networks

As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verificationof location information has become more important. In recent years, there has been an explosion of activity related to lo⁃cation-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transportsystems because of the mission-critical nature of vehicle location verification. In this paper, we review recent researchon wireless location verification related to vehicular networks. We focus on location verification systems that rely on for⁃mal mathematical classification frameworks and show how many systems are either partially or fully encompassed bysuch frameworks.location verification; wireless networks; likelihood ratio test; decision rule

[1]  Eylem Ekici,et al.  Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.

[2]  Sorin A. Huss,et al.  A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks , 2012, Int. J. Intell. Transp. Syst. Res..

[3]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[4]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[5]  Lichun Bao Location Authentication Methods for Wireless Network Access Control , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[6]  Sushanta Das,et al.  Position verification in vehicular communications , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[7]  Srdjan Capkun,et al.  Integrity Regions: Authentication through Presence in Wireless Networks , 2010, IEEE Trans. Mob. Comput..

[8]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[9]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[10]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[11]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[12]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[13]  Pengfei Zhang,et al.  Cooperative location verification for vehicular ad-hoc networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[14]  Gongjun Yan,et al.  Providing location security in vehicular Ad Hoc networks , 2009, IEEE Wireless Communications.

[15]  Yi-Ming Chen,et al.  A beacon-based trust management system for enhancing user centric location privacy in VANETs , 2013, Journal of Communications and Networks.

[16]  Xiaoping Xue,et al.  A trusted neighbor table based location verification for VANET Routing , 2010 .

[17]  Huirong Fu,et al.  Verifying position and velocity for vehicular ad-hoc networks , 2011, Secur. Commun. Networks.

[18]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[19]  Yu Cheng,et al.  Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[20]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[21]  Alvin S. Lim,et al.  Connectivity Aware Routing in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[22]  Mourad Barkat,et al.  Signal detection and estimation , 1991 .

[23]  Shihao Yan,et al.  An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[24]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[25]  Yu Zhang,et al.  Inverting sensor networks and actuating the environment for spatio-temporal access control , 2006, SASN '06.

[26]  Qing Yang,et al.  Location Verification for VANETs Routing , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[27]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[28]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[29]  Hossam S. Hassanein,et al.  Position verification for vehicular networks via analyzing two-hop neighbors information , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[30]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[31]  Robert A. Malaney A location enabled wireless security system , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[32]  Srdjan Capkun,et al.  iPhone and iPod Location Spoofing: Attacks on Public WLAN-based Positioning Systems , 2012 .

[33]  Robert A. Malaney,et al.  A New Scalable Hybrid Routing Protocol for VANETs , 2012, IEEE Transactions on Vehicular Technology.

[34]  Xuemin Shen,et al.  Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[35]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[36]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[37]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[38]  Sangjin Kim,et al.  AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).

[39]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[40]  R. Michael Buehrer,et al.  Handbook of Position Location: Theory, Practice and Advances , 2011 .

[41]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[42]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[43]  Mark L. Psiaki,et al.  Bit-wise parallel algorithms for efficient software correlation applied to a GPS software receiver , 2004, IEEE Transactions on Wireless Communications.

[44]  Hossam S. Hassanein,et al.  Map-guided trajectory-based position verification for vehicular networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[45]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[46]  Panagiotis Papadimitratos,et al.  Secure Position-Based Routing for VANETs , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[47]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.