SecNav: secure broadcast localization and time synchronization in wireless networks
暂无分享,去创建一个
[1] Ajay D. Kshemkalyani,et al. Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.
[2] HubauxJean-Pierre,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2002 .
[3] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[4] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[5] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Srdjan Capkun,et al. Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks , 2007 .
[7] Adrian Perrig,et al. Using Clustering Information for Sensor Network Localization , 2005, DCOSS.
[8] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[11] David C. Moore,et al. Robust distributed network localization with noisy range measurements , 2004, SenSys '04.
[12] L. El Ghaoui,et al. Convex position estimation in wireless sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[13] Radha Poovendran,et al. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.
[14] Srdjan Capkun,et al. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.
[15] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[16] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[17] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[18] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[19] Ted Kremenek,et al. A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.
[20] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[21] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[22] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[23] Brian D. O. Anderson,et al. Rigidity, computation, and randomization in network localization , 2004, IEEE INFOCOM 2004.
[24] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[25] Andy Hopper,et al. A new location technique for the active office , 1997, IEEE Wirel. Commun..
[26] Robert A. Scholtz,et al. Ranging in a dense multipath environment using an UWB radio link , 2002, IEEE J. Sel. Areas Commun..
[27] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[28] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[29] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[30] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[31] A. B. Chatfield. Fundamentals of high accuracy inertial navigation , 1997 .
[32] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[33] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[34] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[35] Robert J. Fontana. Experimental Results from an Ultra Wideband Precision Geolocation System , 2002 .
[36] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[37] J. Mcneff. The global positioning system , 2002 .
[38] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[39] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[40] David Evans,et al. Localization for mobile sensor networks , 2004, MobiCom '04.
[41] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[42] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[43] Nabanita Das,et al. An efficient channel assignment technique for hexagonal cellular networks , 2002, Proceedings International Symposium on Parallel Architectures, Algorithms and Networks. I-SPAN'02.
[44] Gaetano Borriello,et al. SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .
[45] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.
[46] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[47] Peng Ning,et al. Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[48] Mihail L. Sichitiu,et al. Simple, accurate time synchronization for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[49] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[50] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[51] Jan M. Rabaey,et al. Lightweight time synchronization for sensor networks , 2003, WSNA '03.
[52] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[53] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[54] Ian W. Jackson. Anonymous Addresses and Confidentiality of Location , 1996, Information Hiding.
[55] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[56] Radha Poovendran,et al. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.
[57] Miklós Maróti,et al. Radio interferometric geolocation , 2005, SenSys '05.
[58] Deborah Estrin,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .