Attack-resistant location estimation in sensor networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[2] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[3] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[4] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[5] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[6] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[7] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[8] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[9] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[11] Laurent El Ghaoui,et al. Convex Optimization Methods for Sensor Node Position Estimation , 2001, INFOCOM.
[12] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[13] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[14] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[15] Tian He,et al. Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.
[16] Francesco De Pellegrini,et al. Robust location detection in emergency sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[18] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[19] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[20] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[22] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[23] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[24] Radhika Nagpal,et al. Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network , 2003, IPSN.
[25] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[26] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[27] Kai Li,et al. A directionality based location discovery scheme for wireless sensor networks , 2002, WSNA '02.
[28] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[29] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[30] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[31] Peng Ning,et al. LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..
[32] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[33] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[34] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[35] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[36] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[37] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[38] Maria Papadopouli,et al. Cooperative location-sensing for wireless networks , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[39] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[40] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[41] Mani B. Srivastava,et al. The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.
[42] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[43] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .