Secure range-free localization scheme in Wireless sensor networks
暂无分享,去创建一个
[1] Honglong Chen,et al. Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.
[2] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] Hyohyun Choi,et al. Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks , 2008, UIC.
[5] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[7] Makhlouf Aliouat,et al. Data Aggregation Security Challenge in Wireless Sensor Networks , 2011, Ad Hoc Sens. Wirel. Networks.
[8] Bradford W. Parkinson,et al. Global positioning system : theory and applications , 1996 .
[9] Qi Li,et al. A security framework for wireless sensor networks , 2010 .
[10] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[11] Heejo Lee,et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[13] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[15] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[17] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[18] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[19] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[20] Jan M. Rabaey,et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.
[21] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[22] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[23] Narayanan Vijaykrishnan,et al. SLAT : Secure Localization with Attack Tolerance , 2005 .
[24] Honglong Chen,et al. Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.
[25] S.D. Servetto,et al. An analysis of the maximum likelihood estimator for localization problems , 2005, 2nd International Conference on Broadband Networks, 2005..
[26] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.