Robust and Cooperative Localization for Underwater Sensor Networks in the Existence of Malicious Anchors
暂无分享,去创建一个
[1] H. T. Mouftah,et al. Localization techniques for underwater acoustic sensor networks , 2010, IEEE Communications Magazine.
[2] H. T. Mouftah,et al. A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks , 2011, IEEE Communications Surveys & Tutorials.
[3] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[4] Shengming Jiang,et al. On Securing Underwater Acoustic Networks: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[5] Zhimin Ding,et al. ProLo: Localization via Projection for Three-Dimensional Mobile Underwater Sensor Networks , 2019, Sensors.
[6] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[7] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[8] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[9] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] Winston K. G. Seah,et al. A Survey of Techniques and Challenges in Underwater Localization , 2011 .
[11] Yongqing Wu,et al. RSS-Based Target Localization in Underwater Acoustic Sensor Networks via Convex Relaxation , 2019, Sensors.
[12] Md. Yusuf Sarwar Uddin. Low-overhead range-based 3D localization technique for underwater sensor networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[13] David C. Moore,et al. Robust distributed network localization with noisy range measurements , 2004, SenSys '04.
[14] Martin Maier,et al. Toward Quality of Service Protection in Ethernet Passive Optical Networks: Challenges and Solutions , 2007, IEEE Network.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[17] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[18] Shengli Zhou,et al. Efficient localization for large-scale underwater sensor networks , 2010, Ad Hoc Networks.
[19] Hanjiang Luo,et al. Localization Based on MAP and PSO for Drifting-Restricted Underwater Acoustic Sensor Networks , 2019, Sensors.
[20] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[21] Fan Ye,et al. Catching "Moles" in Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[22] Yoan Shin,et al. An Efficient RSS Localization for Underwater Wireless Sensor Networks , 2019, Sensors.
[23] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[24] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[25] Jiannong Cao,et al. Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme , 2010, IEEE Transactions on Mobile Computing.
[26] Ovidiu Banias,et al. Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[27] Yahong Rosa Zheng,et al. Measurement Error Impact on Node Localization of Large Scale Underwater Sensor Networks , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[28] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[29] Chunming Qiao,et al. Towards a Theory of Robust Localization Against Malicious Beacon Nodes , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[30] Daniel Curiac,et al. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).