I. Introduction
Recently, researchers have proposed a number of positioning and distance estimation techniques for wireless networks [1], [2], [3], [4], [5], [6]. However, they all studied these techniques in non-adversarial settings. Distance estimation and positioning techniques are, nevertheless, highly vulnerable to attacks from compromised nodes and external attackers. Compromised nodes can report false position and distance information in order to cheat on their locations. External attackers can modify (spoof) the measured positions and distances of wireless nodes.