Securing Geographic Routing in Wireless Sensor Networks
暂无分享,去创建一个
[1] D. E. Goldberg,et al. Genetic Algorithm in Search , 1989 .
[2] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[3] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[4] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[5] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[6] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[7] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[8] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[9] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[10] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[11] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[13] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[14] Yaping Li,et al. ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .
[15] Radhika Nagpal,et al. Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network , 2003, IPSN.
[16] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[17] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[18] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[19] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[20] Stefano Chessa,et al. GPS free coordinate assignment and routing in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Wade Trappe,et al. MIAMI: methods and infrastructure for the assurance of measurement information , 2005, DMSN '05.
[22] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[23] David E. Culler,et al. Beacon vector routing: scalable point-to-point routing in wireless sensornets , 2005, NSDI.
[24] K. Kang,et al. Towards Resilient Geographic Routing in Wireless Sensor Networks , 2006 .