Visualization of wormholes in sensor networks
暂无分享,去创建一个
[1] Xiang Ji,et al. Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling , 2004, IEEE INFOCOM 2004.
[2] Tony DeRose,et al. Surface reconstruction from unorganized points , 1992, SIGGRAPH.
[3] Jan M. Rabaey,et al. Location in distributed ad-hoc wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[4] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[5] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[7] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[8] Yinyu Ye,et al. Semidefinite programming for ad hoc wireless sensor network localization , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[9] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Jan M. Rabaey,et al. Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.
[11] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[12] Kevin J. Parker,et al. Digital halftoning using a blue-noise mask , 1991, Electronic Imaging.
[13] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[14] Nitin H. Vaidya,et al. Medium access control protocols using directional antennas in ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[15] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[16] Andy Hopper,et al. A new location technique for the active office , 1997, IEEE Wirel. Commun..
[17] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[18] W. Torgerson,et al. Multidimensional scaling of similarity , 1965, Psychometrika.
[19] Nitin H. Vaidya,et al. Using directional antennas for medium access control in ad hoc networks , 2002, MobiCom '02.
[20] Chris Savarese. LOCATIONING IN DISTRIBUTED AD-HOC WIRELESS SENSOR NETWORKS , 2001 .
[21] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[23] Kostas E. Bekris,et al. Robotics-Based Location Sensing Using Wireless Ethernet , 2002, MobiCom '02.
[24] Yu Hen Hu,et al. Vehicle classification in distributed sensor networks , 2004, J. Parallel Distributed Comput..
[25] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[26] Oscar Garcia-Panyella. An easy-to-code smoothing algorithm for 3D reconstructed surfaces , 2003 .
[27] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[28] Ying Zhang,et al. Localization from mere connectivity , 2003, MobiHoc '03.