All your jammers belong to us — Localization of wireless sensors under jamming attack
暂无分享,去创建一个
[1] Srikanth V. Krishnamurthy,et al. Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[2] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[3] Wenyuan Xu,et al. Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[4] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[5] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[6] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[7] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[8] Wenyuan Xu,et al. On Adjusting Power to Defend Wireless Networks from Jamming , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[9] Don J. Torrieri. Principles of Secure Communication Systems , 1985 .
[10] Yong Liu,et al. Towards an open ubiquitous computing environment , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[11] Wenyuan Xu,et al. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges , 2010, DCOSS.
[12] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[13] Donggang Liu,et al. Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.