Attack-Resistant Location Estimation in Wireless Sensor Networks
暂无分享,去创建一个
Donggang Liu | Peng Ning | Wenliang Du | An Liu | Cliff Wang | P. Ning | Donggang Liu | Wenliang Du | An Liu | Cliff X. Wang
[1] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[2] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[3] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[4] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[5] Kai Li,et al. A directionality based location discovery scheme for wireless sensor networks , 2002, WSNA '02.
[6] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[7] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] Radhika Nagpal,et al. Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network , 2003, IPSN.
[9] James Newsome,et al. GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information , 2003, SenSys '03.
[10] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[13] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[14] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[15] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[16] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[19] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[20] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[21] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[22] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[23] Mani B. Srivastava,et al. The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.
[24] Maria Papadopouli,et al. Cooperative location-sensing for wireless networks , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[25] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI '03.
[26] Laurent El Ghaoui,et al. Convex Optimization Methods for Sensor Node Position Estimation , 2001, IEEE Conference on Computer Communications.
[27] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[28] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[29] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[30] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[31] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[32] Tian He,et al. Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.
[33] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[34] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[35] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[36] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[37] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[38] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[39] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[40] Francesco De Pellegrini,et al. Robust location detection in emergency sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[41] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[42] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[43] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[44] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[45] Peng Ning,et al. LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..
[46] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[47] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..