메뉴 건너뛰기




Volumn 6, Issue 2, 2008, Pages 195-209

Secure probabilistic location verification in randomly deployed wireless sensor networks

Author keywords

Localization; Location verification; Modeling; Trust; Wireless sensor networks

Indexed keywords

ALGORITHMS; DATA REDUCTION; PACKET NETWORKS;

EID: 35548948372     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.11.006     Document Type: Article
Times cited : (38)

References (15)
  • 1
    • 0041973656 scopus 로고    scopus 로고
    • D. Niculescu, B. Nath, Ad hoc positioning system (aps) using aoa, in: Proc. IEEE INFOCOM, 2003.
  • 2
    • 1542329081 scopus 로고    scopus 로고
    • T. He, C. Huang, B. Blum, J. Stankovic, T. Abdelzaher, Range-free localization schemes for large scale sensor networks, in: Proc. Mobicom, 2003.
  • 3
    • 25844493197 scopus 로고    scopus 로고
    • L. Fang, W. Du, P. Ning, A beacon-less location discovery scheme for wireless sensor networks, in: Proc. IEEE INFOCOM, 2005.
  • 4
    • 25844439422 scopus 로고    scopus 로고
    • S. Capkun, J.-P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proc. IEEE INFOCOM, 2005.
  • 5
    • 11244264140 scopus 로고    scopus 로고
    • L. Lazos, R. Poovendran, Serloc: secure range-independent localization for wireless sensor networks, in: ACM Workshop on Wireless Security (ACM WiSe), 2004.
  • 6
    • 33144467507 scopus 로고    scopus 로고
    • Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: Proc. IPSN, 2005.
  • 7
    • 33144467903 scopus 로고    scopus 로고
    • D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: Proc. IPSN, 2005.
  • 8
    • 1542317849 scopus 로고    scopus 로고
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security (ACM WiSe), 2003.
  • 9
    • 33144472023 scopus 로고    scopus 로고
    • L. Lazos, R. Poovendran, S. Capkun, Rope: Robust position estimation in wireless sensor networks, in: Proc. IPSN, 2005.
  • 10
    • 14844304757 scopus 로고    scopus 로고
    • R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruus, TinyPK: Securing sensor networks with public key technology, in: Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 59-64.
  • 11
    • 29844438192 scopus 로고    scopus 로고
    • S. Vural, E. Ekici, Analysis of hop-distance relationship in spatially random sensor networks, in: Proc. ACM MobiHoc, 2005, pp. 320-331.
  • 12
    • 4544283175 scopus 로고    scopus 로고
    • Q. He, D. Wu, P. Khosla, Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks, in: Proc. IEEE WCNC, 2004.
  • 13
    • 24944466187 scopus 로고    scopus 로고
    • L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. Chang, Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, in: IEEE Wireless and Communications and Networking Conference (WCNC), 2005.
  • 14
    • 35548957504 scopus 로고    scopus 로고
    • A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: International Conference on Wireless Ad Hoc Networks (IWWAN), 2005.
  • 15
    • 85141908900 scopus 로고    scopus 로고
    • E. Ngai, J. Liu, M. Lyu, On the intruder detection for sinkhole attack in wireless sensor networks, in: IEEE International Conference on Communication (ICC), 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.