A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
暂无分享,去创建一个
Gulshan Kumar | Mritunjay Kumar Rai | Rahul Saha | Hye-Jin Kim | M. Rai | Gulshan Kumar | R. Saha | Hye-jin Kim
[1] Rabi N. Mahapatra,et al. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[3] Guangjie Han,et al. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks , 2016, Sensors.
[4] Miodrag Potkonjak,et al. Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure , 2001, MobiHoc '01.
[5] Li Xiao,et al. Sensor localization in concave environments , 2008, TOSN.
[6] Avinash Srinivasan. SecLoc - secure localization in WSNs using CDS , 2011, Secur. Commun. Networks.
[7] Bo Yu,et al. Security Analysis on Node Localization Systems of Wireless Sensor Networks: Security Analysis on Node Localization Systems of Wireless Sensor Networks , 2010 .
[8] Qiang Zhang,et al. A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[9] Gaurav S. Sukhatme,et al. On the Feasibility of Ad-Hoc Localization Systems , 2003 .
[10] Hongyi Wu,et al. Localization in Wireless Ad Hoc Networks , 2005 .
[11] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[12] Magdy A. Bayoumi,et al. Secure localization for wireless sensor networks using decentralized dynamic key generation , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[13] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[14] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[16] Samiran Chattopadhyay,et al. Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network , 2016, J. Comput. Networks Commun..
[17] Jingsha He,et al. A Signcryption-based Secure Localization Scheme in Wireless Sensor Networks , 2012 .
[18] Srdjan Capkun,et al. Location privacy of distance bounding protocols , 2008, CCS.
[19] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[20] Jie Wu,et al. A Survey on Secure Localization in Wireless Sensor Networks , 2007 .
[21] Azzedine Boukerche,et al. Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems , 2008, Comput. Commun..
[22] Robert H. Deng,et al. Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.
[23] Jie Yang,et al. Protecting Multi-Lateral Localization Privacy in Pervasive Environments , 2015, IEEE/ACM Transactions on Networking.
[24] B. R. Badrinath,et al. Localized positioning in ad hoc networks , 2003, Ad Hoc Networks.
[25] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[26] Guangjie Han,et al. Secure Localization in Wireless Sensor Networks: A Survey (Invited Paper) , 2011, J. Commun..
[27] Aihua Xia,et al. Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..
[28] John A. Stankovic,et al. Practical and secure localization and key distribution for wireless sensor networks , 2012, Ad Hoc Networks.
[29] Prathima Agrawal,et al. Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[30] Chin-Chen Chang,et al. A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[31] Rui Yang,et al. An Efficient Secure DV-Hop Localization for Wireless Sensor Network , 2015 .
[32] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[33] Gulshan Kumar,et al. An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs , 2017, J. Netw. Comput. Appl..
[34] Alan Dahgwo Yein,et al. Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution , 2016 .
[35] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[36] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[37] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[38] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[39] Min Wu,et al. An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.
[40] Chunming Qiao,et al. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.
[41] Krishnendu Chatterjee,et al. Game theoretic secure localization in wireless sensor networks , 2014, 2014 International Conference on the Internet of Things (IOT).