A comprehensive investigation of secure location estimation techniques for WSN applications
暂无分享,去创建一个
[1] Prathima Agrawal,et al. Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[2] Tian He,et al. Detecting Phantom Nodes in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[5] A.H. Kemp,et al. Secure Location Estimation in Large Scale Wireless Sensor Networks , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.
[6] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[7] A. Plowman,et al. Application of remote thermal imaging and night vision technology to improve endangered wildlife resource management with minimal animal distress and hazard to humans , 2005 .
[8] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[9] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[10] Tarek F. Abdelzaher,et al. Range-free localization and its impact on large scale sensor networks , 2005, TECS.
[11] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[12] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[13] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[14] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[15] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[16] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[17] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[18] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[19] Srdjan Capkun,et al. Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks , 2007 .
[20] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[21] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] A. Savvides,et al. Title Dynamic Fine-Grained Localization in Ad-Hoc Wireless Sensor Networks , 2001 .
[23] Eylem Ekici,et al. Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.
[24] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[25] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[26] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[27] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.