A Range-Based Secure Localization Algorithm for Wireless Sensor Networks
暂无分享,去创建一个
Feng Han | Xingcheng Liu | Zhihong Pan | Shaohua Su | Yitong Liu | Xingcheng Liu | S. Su | Yitong Liu | Zhihong Pan | Feng Han
[1] Abdennaceur Kachouri,et al. Outlier detection for wireless sensor networks using density-based clustering approach , 2017, IET Wirel. Sens. Syst..
[2] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[3] Shihao Yan,et al. Location Verification Systems for VANETs in Rician Fading Channels , 2014, IEEE Transactions on Vehicular Technology.
[4] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[5] W. Yang,et al. Voting-On-Grid Clustering for Secure Localization in Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.
[6] Mianxiong Dong,et al. DisLoc: A Convex Partitioning Based Approach for Distributed 3-D Localization in Wireless Sensor Networks , 2017, IEEE Sensors Journal.
[7] Chin-Tau A. Lea,et al. Received Signal Strength-Based Wireless Localization via Semidefinite Programming: Noncooperative and Cooperative Schemes , 2010, IEEE Transactions on Vehicular Technology.
[8] Shihao Yan,et al. An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[9] Sajal K. Das,et al. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.
[10] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[11] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[12] Ismail Güvenç,et al. A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.
[13] Jihyuk Choi,et al. Secure Location Verification Using Simultaneous Multilateration , 2012, IEEE Transactions on Wireless Communications.
[14] Sajal K. Das,et al. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Hao Wang,et al. WSN Localization Using RSS in Three-Dimensional Space—A Geometric Method With Closed-Form Solution , 2016, IEEE Sensors Journal.
[16] Lawrence Wai-Choong Wong,et al. Geo-Spatial Location Spoofing Detection for Internet of Things , 2016, IEEE Internet of Things Journal.
[17] Reza Ghazizadeh,et al. Range Free Localization in Wireless Sensor Networks for Homogeneous and Non-Homogeneous Environment , 2016, IEEE Sensors Journal.
[18] Yu Peng,et al. RSSI-Based Localization Through Uncertain Data Mapping for Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[19] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[20] Umberto Mengali,et al. TOA Estimation with the IEEE 802.15.4a Standard , 2010, IEEE Transactions on Wireless Communications.
[21] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[22] J M Bland,et al. Statistical methods for assessing agreement between two methods of clinical measurement , 1986 .
[23] Marco Fiore,et al. Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing , 2014, IEEE Transactions on Mobile Computing.
[24] Marco Fiore,et al. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[25] Nicola Basilico,et al. Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.
[26] Min Wu,et al. An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.
[27] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[28] Dong-Yang Liu. Attack-resistant location estimation in wireless sensor networks , 2013 .
[29] Yi Xie,et al. An Optimization Scheme of Enhanced Adaptive Dynamic Energy Consumption Based on Joint Network-Channel Coding in WSNs , 2017, IEEE Sensors Journal.