Positioning of Wireless Sensor Nodes in the Presence of Liars
暂无分享,去创建一个
[1] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[2] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[3] V. Padmanabhan,et al. Enhancements to the RADAR User Location and Tracking System , 2000 .
[4] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[7] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[8] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Pat Morin,et al. Improving Distance Based Geographic Location Techniques in Sensor Networks , 2004, ADHOC-NOW.
[10] Sébastien Tixeuil,et al. Deterministic secure positioning in wireless sensor networks , 2007, Theor. Comput. Sci..
[11] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[12] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[13] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[14] Tian He,et al. Secure localization with phantom node detection , 2008, Ad Hoc Networks.