-
1
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
Tel-Aviv, Israel, Mar.
-
P. Bahl and V. Padmanabhan, "RADAR: An in-building RF-based user location and tracking system," in Proc. IEEE INFOCOM, Tel-Aviv, Israel, Mar. 2000, pp. 775-784.
-
(2000)
Proc. IEEE INFOCOM
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.2
-
2
-
-
85089416445
-
A distance routing effect algorithm for mobility (DREAM)
-
Dallas, TX, Oct.
-
S. Basagni, I. Chlamtac, V. Syrotiuk, and B. Woodward, "A distance routing effect algorithm for mobility (DREAM)," in Proc. MOBICOM, Dallas, TX, Oct. 1998, pp. 76-84.
-
(1998)
Proc. MOBICOM
, pp. 76-84
-
-
Basagni, S.1
Chlamtac, I.2
Syrotiuk, V.3
Woodward, B.4
-
3
-
-
0034291601
-
GPS-less low cost outdoor localization for very small devices
-
Oct.
-
N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less low cost outdoor localization for very small devices," IEEE Pers. Commun. Mag., vol. 7, no. 5, pp. 28-34, Oct. 2000.
-
(2000)
IEEE Pers. Commun. Mag.
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
5
-
-
0034976472
-
GPS-free positioning in mobile ad-hoc networks
-
Maui, Hawaii, Jan.
-
S. Capkun, M. Hamdi, and J. Hubaux, "GPS-free positioning in mobile ad-hoc networks," in Proc. HICCSS, Maui, Hawaii, Jan. 2001, pp. 3481-3490.
-
(2001)
Proc. HICCSS
, pp. 3481-3490
-
-
Capkun, S.1
Hamdi, M.2
Hubaux, J.3
-
6
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Mar.
-
S. Čapkun and J. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. IEEE INFOCOM, Mar. 2005, pp. 1917-1928.
-
(2005)
Proc. IEEE INFOCOM
, pp. 1917-1928
-
-
Čapkun, S.1
Hubaux, J.2
-
7
-
-
84957041827
-
Almost optimal hash sequence traversal
-
Berlin, Germany: Springer-Verlag, Proc. FC
-
D. Coppersmith and M. Jakobsson, "Almost optimal hash sequence traversal," in Lecture Notes in Computer Science, IFCA. Berlin, Germany: Springer-Verlag, 2002, Proc. FC, pp. 102-119.
-
(2002)
Lecture Notes in Computer Science, IFCA
, pp. 102-119
-
-
Coppersmith, D.1
Jakobsson, M.2
-
9
-
-
84947273682
-
The Sybil attack
-
Cambridge, MA, Mar., Proc. IPTPS
-
J. Douceur, "The Sybil attack," in Lecture Notes in Computer Science Cambridge, MA, Mar. 2002, vol. 2429, Proc. IPTPS, pp. 251-260.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
10
-
-
1542329081
-
Rangefree localization schemes in large scale sensor network
-
San Diego, CA, Sep.
-
T. He, C. Huang, B. Slum, J. Stankovic, and T. Abdelzaher, "Rangefree localization schemes in large scale sensor network," in Proc. MOBICOM, San Diego, CA, Sep. 2003, pp. 81-95.
-
(2003)
Proc. MOBICOM
, pp. 81-95
-
-
He, T.1
Huang, C.2
Slum, B.3
Stankovic, J.4
Abdelzaher, T.5
-
11
-
-
0003574092
-
-
Berlin, Germany: Springer-Verlag
-
B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice, 4th ed. Berlin, Germany: Springer-Verlag, 1997.
-
(1997)
Global Positioning System: Theory and Practice, 4th Ed.
-
-
Hofmann-Wellenhof, B.1
Lichtenegger, H.2
Collins, J.3
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
San Francisco, CA, April
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. INFOCOM, San Francisco, CA, April 2003, pp. 1976-1986.
-
(2003)
Proc. INFOCOM
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
13
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. 3rd Int. Conf. Inf. Process, Sensor Netw., 2004, pp. 259-268.
-
(2004)
Proc. 3rd Int. Conf. Inf. Process, Sensor Netw.
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
15
-
-
35048826237
-
An asymmetric security mechanism for navigation signals
-
M. G. Kuhn, "An asymmetric security mechanism for navigation signals," in Proc. Inf. Hiding Workshop, 2004, pp. 239-252.
-
(2004)
Proc. Inf. Hiding Workshop
, pp. 239-252
-
-
Kuhn, M.G.1
-
16
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
0141787007
-
Energy-aware secure multicast communication in ad-hoc networks using geographic location information
-
Hong Kong, China, Apr.
-
L. Lazos and R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographic location information," in Proc. IEEE ICASSP, vol. 6, Hong Kong, China, Apr. 2003, pp. 201-204.
-
(2003)
Proc. IEEE ICASSP
, vol.6
, pp. 201-204
-
-
Lazos, L.1
Poovendran, R.2
-
18
-
-
33144460850
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Philadelphia, PA, Oct.
-
_, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proc. WISE, Philadelphia, PA, Oct. 2004, pp. 21-30.
-
(2004)
Proc. WISE
, pp. 21-30
-
-
-
19
-
-
34247106100
-
Robust range-independent localization for wireless sensor networks
-
Aug.
-
_, "Robust range-independent localization for wireless sensor networks," Trans. Sensor Netw., vol. 1, no. 1, pp. 73-100, Aug. 2005.
-
(2005)
Trans. Sensor Netw.
, vol.1
, Issue.1
, pp. 73-100
-
-
-
20
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
L. Lazos, S. Capkun, and R. Poovendran, "ROPE: Robust position estimation in wireless sensor networks," in Proc. 4th Int. Conf. Inf. Process. Sensor Netw., 2005, pp. 324-331.
-
(2005)
Proc. 4th Int. Conf. Inf. Process. Sensor Netw.
, pp. 324-331
-
-
Lazos, L.1
Capkun, S.2
Poovendran, R.3
-
21
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proc. 4th Int. Conf. Inf. Process. Sensor Netw., 2005, pp. 91-98.
-
(2005)
Proc. 4th Int. Conf. Inf. Process. Sensor Netw.
, pp. 91-98
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
22
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in Proc. 4th Int. Conf. Inf. Process. Sensor Netw., 2005, pp. 99-107.
-
(2005)
Proc. 4th Int. Conf. Inf. Process. Sensor Netw.
, pp. 99-107
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
23
-
-
85000276942
-
Multi-level μTESLA: Broadcast authentication for distributed sensor networks
-
Nov.
-
D. Liu and P. Ning, "Multi-level μTESLA: Broadcast authentication for distributed sensor networks," Proc. ACM Trans. Embedded Comput. Syst., vol. 3, no. 4, pp. 800-836, Nov. 2004.
-
(2004)
Proc. ACM Trans. Embedded Comput. Syst.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
24
-
-
70349281772
-
-
[Online]
-
MICA Wireless Measurement System. [Online]. Available: http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA.pdf
-
MICA Wireless Measurement System.
-
-
-
25
-
-
35248891504
-
Organizing a global coordinate system from local information on an ad hoc sensor network
-
Proc. IPSN, Palo Alto, CA, Apr.
-
R. Nagpal, H. Shrobe, and J. Bachrach, "Organizing a global coordinate system from local information on an ad hoc sensor network," in Lecture Notes in Computer Science, vol. 2634, Proc. IPSN, Palo Alto, CA, Apr. 2003, pp. 333-348.
-
(2003)
Lecture Notes in Computer Science
, vol.2634
, pp. 333-348
-
-
Nagpal, R.1
Shrobe, H.2
Bachrach, J.3
-
26
-
-
0035684931
-
Ad-hoc positioning systems (APS)
-
San Antonio, TX, Nov.
-
D. Nicolescu and B. Nath, "Ad-hoc positioning systems (APS)," in Proc. IEEE GLOBECOM, vol. 5, San Antonio, TX, Nov. 2001, pp. 2926-2931.
-
(2001)
Proc. IEEE GLOBECOM
, vol.5
, pp. 2926-2931
-
-
Nicolescu, D.1
Nath, B.2
-
27
-
-
0041973656
-
Ad hoc positioning system (APS) using AoA
-
San Francisco, CA, Mar.
-
_, "Ad hoc positioning system (APS) using AoA," in Proc. INFOCOM, vol. 3, San Francisco, CA, Mar. 2003, pp. 1734-1743.
-
(2003)
Proc. INFOCOM
, vol.3
, pp. 1734-1743
-
-
-
28
-
-
1542341259
-
Secure routing for mobile ad hoc networks
-
Jan.
-
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in Proc. CNDS, Jan. 2002.
-
(2002)
Proc. CNDS
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
29
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocols for sensor networks," in Proc. 7th Ann. Int. Conf. Mobile Comput. Netw., 2001, pp. 189-199.
-
(2001)
Proc. 7th Ann. Int. Conf. Mobile Comput. Netw.
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
30
-
-
0034539094
-
The cricket location-support system
-
Boston, MA, Aug.
-
N. Priyantha, A. Chakraborthy, and H. Balakrishnan, "The cricket location-support system," in Proc. MOBICOM, Boston, MA, Aug. 2000, pp. 32-43.
-
(2000)
Proc. MOBICOM
, pp. 32-43
-
-
Priyantha, N.1
Chakraborthy, A.2
Balakrishnan, H.3
-
31
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
Rome, Italy, Jul.
-
A. Savvides, C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proc. MOBICOM, Rome, Italy, Jul. 2001, pp. 166-179.
-
(2001)
Proc. MOBICOM
, pp. 166-179
-
-
Savvides, A.1
Han, C.2
Srivastava, M.3
-
33
-
-
85116427082
-
Defending Sybil attacks in sensor networks
-
Jun.
-
Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending Sybil attacks in sensor networks," presented at the Proc. Int. Workshop on Security in Distributed Comput. Syst., Jun. 2005.
-
(2005)
Proc. Int. Workshop on Security in Distributed Comput. Syst.
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
|