Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. The PIM architecture for wide-area multicast routing , 1996, TNET.
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Ben Y. Zhao,et al. Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination , 2001, NOSSDAV '01.
[4] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[5] Christophe Diot,et al. Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..
[6] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[7] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[8] Kevin C. Almeroth,et al. The evolution of multicast: from the MBone to interdomain multicast to Internet2 deployment , 2000, IEEE Netw..
[9] Tarek F. Abdelzaher,et al. Range-free localization and its impact on large scale sensor networks , 2005, TECS.
[10] Peng Ning,et al. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.
[11] Charles L. Seitz,et al. Myrinet: A Gigabit-per-Second Local Area Network , 1995, IEEE Micro.
[12] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[13] Samir Khuller,et al. Construction of an efficient overlay multicast infrastructure for real-time applications , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Jonathan S. Turner,et al. Routing in overlay multicast networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[15] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[16] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[19] Marcel Waldvogel,et al. Dimensioning server access bandwidth and multicast routing in overlay networks , 2001, NOSSDAV '01.
[20] Eylem Ekici,et al. A Probabilistic Approach to Location Verification in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[21] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[22] Wei,et al. Power Consumption Model in Two-tiered Wireless Sensor Networks , 2006 .
[23] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[24] Mario Gerla,et al. A Comparative Study of Multicast Protocols: Top, Bottom, or In the Middle? , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[25] Dhabaleswar K. Panda,et al. High performance and reliable NIC-based multicast over Myrinet/GM-2 , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[26] Eylem Ekici,et al. Analysis of hop-distance relationship in spatially random sensor networks , 2005, MobiHoc '05.
[27] Steven McCanne,et al. RMX: reliable multicast for heterogeneous networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).