메뉴 건너뛰기




Volumn , Issue , 2007, Pages 907-911

Secure hop-count based localization in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; ELECTRIC NETWORK ANALYSIS; INTELLIGENT CONTROL; SENSORS; TELECOMMUNICATION NETWORKS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 48349098629     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2007.205     Document Type: Conference Paper
Times cited : (11)

References (11)
  • 1
    • 48349120202 scopus 로고    scopus 로고
    • A longer version of this paper. In http://zyingp.googlepages.com/ SHOLOCLong.pdf.
    • A longer version of this paper. In http://zyingp.googlepages.com/ SHOLOCLong.pdf.
  • 2
    • 48349129107 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • S. Capkun and J. P. Hubaux. Secure positioning in wireless networks. IEEE JSAC, 2006.
    • (2006) IEEE JSAC
    • Capkun, S.1    Hubaux, J.P.2
  • 3
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM, 2003.
    • (2003) Proceedings of INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 4
    • 0002832952 scopus 로고
    • Optimum tranmission radii for packet radio networks or why six is a magic number
    • L. Kleinrock and J. Silvester. Optimum tranmission radii for packet radio networks or why six is a magic number. In Proceedings of the IEEE NTC, 1978.
    • (1978) Proceedings of the IEEE NTC
    • Kleinrock, L.1    Silvester, J.2
  • 5
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of IPSN, 2005.
    • (2005) Proceedings of IPSN
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4
  • 6
    • 33144467903 scopus 로고    scopus 로고
    • Attack-resistant location estimation in sensor networks
    • D. Liu, P. Ning, and W. K. Du. Attack-resistant location estimation in sensor networks. In Proceedings of IPSN, 2005.
    • (2005) Proceedings of IPSN
    • Liu, D.1    Ning, P.2    Du, W.K.3
  • 7
    • 2942695143 scopus 로고    scopus 로고
    • Organizing a global coordinate system from local information on an ad hoc sensor network
    • R. Nagpal, H. Shrobe, and J. Bachrach. Organizing a global coordinate system from local information on an ad hoc sensor network. In Proceedings of IPSN, 2003.
    • (2003) Proceedings of IPSN
    • Nagpal, R.1    Shrobe, H.2    Bachrach, J.3
  • 9
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signature of multicast streams over lossy channels
    • May
    • A. Perrig, R. Canetti, D. Tygar, and D. Song. Efficient authentication and signature of multicast streams over lossy channels. In Proceedings of Oakland, pages 56-73, May 2000.
    • (2000) Proceedings of Oakland , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 11
    • 85084163355 scopus 로고    scopus 로고
    • Robust positioning algorithms for distributed ad-hoc wireless sensor networks
    • C. Savarese and J. Rabay. Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In Proceedings of USENIX, 2002.
    • (2002) Proceedings of USENIX
    • Savarese, C.1    Rabay, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.