Securing a wireless sensor network for human tracking: a review of solutions
暂无分享,去创建一个
Julio Barbancho | Alejandro Carrasco | José Luis Sevillano | Diego Francisco Larios Marín | Francisco Alcaraz | J. Sevillano | J. Barbancho | A. Carrasco | D. F. L. Marín | Francisco Alcaraz
[1] Jörg Kaiser,et al. Improving the Accuracy of Ultrasound-Based Localisation Systems , 2005, LoCA.
[2] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[3] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[4] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[5] Subramaniam Shamala,et al. A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks , 2012, Int. J. Commun. Syst..
[6] Xinsong Liu,et al. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..
[7] Cristina Comaniciu,et al. Cross-layer MAC design for location-aware wireless sensor networks , 2011, Int. J. Commun. Syst..
[8] Abdalkarim Awad,et al. Adaptive Distance Estimation and Localization in WSN using RSSI Measures , 2007, 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007).
[9] Cristina Alcaraz,et al. A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes , 2007, Mob. Networks Appl..
[10] Feng Xia,et al. A Localization Strategy Based on N-times Trilateral Centroid with Weight , 2012, Int. J. Commun. Syst..
[11] Ritu Sharma,et al. Analysis of Security Protocols in Wireless Sensor Network , 2010 .
[12] Jiannong Cao,et al. Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.
[13] Feng Xia,et al. An integrated scheme based on service classification in pervasive mobile services , 2012, Int. J. Commun. Syst..
[14] Gianluca Dini,et al. On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[15] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[16] E. Jovanov,et al. An environment for runtime power monitoring of wireless sensor network platforms , 2005, Proceedings of the Thirty-Seventh Southeastern Symposium on System Theory, 2005. SSST '05..
[17] Elfed Lewis,et al. Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.
[18] P. Pandarinath. Secure localization with defense against selective forwarding attacks in wireless sensor networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[19] Zhikui Chen,et al. An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks , 2012, Int. J. Commun. Syst..
[20] Ingrid Moerman,et al. Throughput and Delay Analysis of Unslotted IEEE 802.15.4 , 2006, J. Networks.
[21] Azzedine Boukerche,et al. Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.
[22] Azzedine Boukerche,et al. A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.
[23] Santosh Devasia,et al. A Survey of Control Issues in Nanopositioning , 2007, IEEE Transactions on Control Systems Technology.
[24] Ravi Prakash,et al. Parallel and Gaussian frequency hopping for dynamic coexistence in the unlicensed band , 2011, Int. J. Commun. Syst..
[25] Rong Peng,et al. Angle of Arrival Localization for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[26] Yun Liu,et al. High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..
[27] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[28] Joel J. P. C. Rodrigues,et al. Routing and mobility approaches in IPv6 over LoWPAN mesh networks , 2011, Int. J. Commun. Syst..
[29] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[30] Carlos León,et al. LIS: Localization based on an intelligent distributed fuzzy system applied to a WSN , 2012, Ad Hoc Networks.
[31] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[32] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[33] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[34] Guangjie Han,et al. A novel secure localization scheme against collaborative collusion in wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[35] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[36] Theodore B. Zahariadis,et al. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..
[37] Philip Levis,et al. TinyOS Programming: Introduction , 2009 .
[38] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[39] Mohammad Iftekhar Husain,et al. IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks , 2009 .
[40] Luay A. Wahsheh,et al. Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[41] M. S. Alam,et al. Efficient CDMA wireless position location system using TDOA method , 2011, Int. J. Commun. Syst..
[42] Brian D. O. Anderson,et al. Wireless sensor network localization techniques , 2007, Comput. Networks.
[43] Kouichi Sakurai,et al. A generic evaluation method for key management schemes in wireless sensor network , 2011, ICUIMC '11.
[44] Daqiang Zhang,et al. Internet of Things , 2012, J. Univers. Comput. Sci..
[45] Zhang Naitong,et al. A Two-Step TOA Estimation Method for UWB Based Wireless Sensor Networks , 2007 .
[46] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[47] Lin Lei,et al. An improved node localization algorithm based on DV-HOP in WSN , 2010, 2010 2nd International Conference on Advanced Computer Control.
[48] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[49] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[50] Eun-Jun Yoon,et al. Cryptanalysis of a simple three-party password-based key exchange protocol , 2011, Int. J. Commun. Syst..
[51] Matt Welsh,et al. MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking , 2005, LoCA.
[52] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[53] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[54] Adam Dunkels,et al. Time synchronization for predictable and secure data collection in wireless sensor networks , 2007 .
[55] Mario Gerla,et al. Measuring effective capacity of IEEE 802.15.4 beaconless mode , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..