Detecting Phantom Nodes in Wireless Sensor Networks
暂无分享,去创建一个
[1] S. Schiffman. Introduction to Multidimensional Scaling , 1981 .
[2] Symeon Papavassiliou,et al. A position-based multi-zone routing protocol for wide area mobile ad-hoc networks , 1999, 1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363).
[3] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.
[4] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[5] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[6] David R. Karger,et al. A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.
[7] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[8] V. Padmanabhan,et al. Enhancements to the RADAR User Location and Tracking System , 2000 .
[9] Seth J. Teller,et al. The cricket compass for context-aware mobile applications , 2001, MobiCom '01.
[10] Miodrag Potkonjak,et al. Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.
[11] Deborah Estrin,et al. Adaptive beacon placement , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[12] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[13] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[14] Deborah Estrin,et al. Density-adaptive beacon placement algorithms for localiza-tion in ad hoc wireless networks , 2002 .
[15] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[16] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[18] Tian He,et al. Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.
[19] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[21] Ashish Goel,et al. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks , 2003, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[22] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[23] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[24] David C. Moore,et al. Robust distributed network localization with noisy range measurements , 2004, SenSys '04.
[25] Gang Zhou,et al. Impact of radio irregularity on wireless sensor networks , 2004, MobiSys '04.
[26] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[27] Deborah Estrin,et al. A wireless sensor network For structural monitoring , 2004, SenSys '04.
[28] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[29] John Anderson,et al. An analysis of a large scale habitat monitoring application , 2004, SenSys '04.
[30] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[31] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[32] Weili Wu,et al. Energy-efficient target coverage in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[33] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[34] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[35] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[36] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[37] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[38] Brian D. O. Anderson,et al. Localization in sparse networks using sweeps , 2006, MobiCom '06.
[39] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[40] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[41] Brian D. O. Anderson,et al. Precise Localization using Sweeps in Sparse Networks , 2006, MobiCom 2006.