暂无分享,去创建一个
Moustafa Youssef | Waleed Ammar | Ahmed ElDawy | Waleed Ammar | M. Youssef | A. Eldawy | Ahmed Eldawy | Bridger Waleed Ammar
[1] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[2] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[3] Prathima Agrawal,et al. Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[4] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[5] Moustafa Youssef,et al. A Taxonomy of Localization Schemes for Wireless Sensor Networks , 2007, ICWN.
[6] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[7] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Randall K. Nichols,et al. Wireless Security: Models, Threats, and Solutions , 2001 .
[10] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[11] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[12] Scott Shenker,et al. Geographic routing without location information , 2003, MobiCom '03.
[13] Prathima Agrawal,et al. A low-cost robust localization scheme for WLAN , 2006, WICON '06.
[14] Donggang Liu,et al. Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.
[15] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[16] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[17] Srdjan Capkun,et al. Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks , 2007 .
[18] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[19] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[20] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[21] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.