Security Games for Node Localization through Verifiable Multilateration
نویسندگان
چکیده
منابع مشابه
The n-Hop Multilateration Primitive for Node Localization Problems
The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. In this paper we study node localization, a component technology that would enhance the effectiveness and capabilities of this new class of networks. The n-hop multilateration primitive presented here, enables ad-hoc ...
متن کاملTDoA-based Localization Using Enhanced Multilateration
For the IPSN 2016 Microsoft indoor localization competition, we propose a system based on uplink TDoA using commerically available hardware from Nanotron and a proprietary multilateration algorithm.
متن کاملEnhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to a...
متن کاملVerifiable Equilibria in Boolean Games
This work is motivated by the following concern. Suppose we have a game exhibiting multiple Nash equilibria, with little to distinguish them except that one of them can be verified while the others cannot. That is, one of these equilibria carries sufficient information that, if this is the outcome, then the players can tell that an equilibrium has been played. This provides an argument for this...
متن کاملNode localization through physical layer network coding: Bootstrap, security, and accuracy
Previous research on physical layer network coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed in [1]. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many important issues to turn the idea into a pra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2014
ISSN: 1545-5971
DOI: 10.1109/tdsc.2013.30