메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks

Author keywords

[No Author keywords available]

Indexed keywords

CANDIDATE LOCATIONS; DIGITAL SIGNATURE; EMERGENCY SERVICE; LOCALIZATION ACCURACY; LOCALIZATION AND TRACKING; MALICIOUS INSIDERS; RECEIVED SIGNAL STRENGTH; SIGNAL SOURCE; TRANSMITTING POWER; VARIABLE NUMBER; VEHICULAR NETWORKS;

EID: 68949105568     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/2009/128679     Document Type: Article
Times cited : (14)

References (28)
  • 3
    • 84954456621 scopus 로고    scopus 로고
    • Proceedings of the 2nd USENIX Workshop on Electronic Commerce November 1996 Oakland, Calif, USA
    • Anderson R., Kuhn M., Tamper resistance: a cautionary note Proceedings of the 2nd USENIX Workshop on Electronic Commerce November 1996 Oakland, Calif, USA 1 11
    • Tamper resistance: A cautionary note , pp. 1-11
    • Anderson, R.1    Kuhn, M.2
  • 4
    • 0003584029 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Federal Information Processing Standards 140-2, NIST, May 2001
    • National Institute of Standards and Technology, Security Requirements for Cryptographic Modules. Federal Information Processing Standards 140-2, NIST, May 2001
    • Security Requirements for Cryptographic Modules
  • 8
    • 68949138994 scopus 로고    scopus 로고
    • Insider attack attribution using signal strength-based hyperbolic location estimation
    • Laurendeau C., Barbeau M., Insider attack attribution using signal strength-based hyperbolic location estimation Security and Communication Networks 2008 1 4 337 349
    • (2008) Security and Communication Networks , vol.1 , Issue.4 , pp. 337-349
    • Laurendeau, C.1    Barbeau, M.2
  • 11
    • 36749097842 scopus 로고    scopus 로고
    • Vehicular node localization using received-signal-strength indicator
    • Parker R., Valaee S., Vehicular node localization using received-signal-strength indicator IEEE Transactions on Vehicular Technology 2007 56 6, part 1 3371 3380
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 PART 1 , pp. 3371-3380
    • Parker, R.1    Valaee, S.2
  • 12
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • Hubaux J.-P., apkun S., Luo J., The security and privacy of smart vehicles IEEE Security Privacy 2004 2 3 49 55
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.-P.1    Apkun, S.2    Luo, J.3
  • 14
    • 84976295016 scopus 로고    scopus 로고
    • Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT 94) May 1994 Perugia, Italy Springer Lecture Notes in Computer Science
    • Brands S., Chaum D., Distance-bounding protocols 765 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT 94) May 1994 Perugia, Italy Springer 344 359 Lecture Notes in Computer Science
    • Distance-bounding protocols , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 15
    • 68949157883 scopus 로고    scopus 로고
    • Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 06) September 2006 Los Angeles, Calif, USA
    • Xiao B., Yu B., Gao C., Detection and localization of sybil nodes in VANETs Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 06) September 2006 Los Angeles, Calif, USA 1 8
    • Detection and localization of sybil nodes in VANETs , pp. 1-8
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 16
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • Leinmller T., Schoch E., Kargl F., Position verification approaches for vehicular ad hoc networks IEEE Wireless Communications 2006 13 5 16 21
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 16-21
    • Leinmller, T.1    Schoch, E.2    Kargl, F.3
  • 17
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Berlin, Germany Springer Lecture Notes in Computer Science
    • Douceur J. R., The Sybil attack Peer-to-Peer Systems 2002 2429 Berlin, Germany Springer 251 260 Lecture Notes in Computer Science
    • (2002) Peer-to-Peer Systems , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 18
    • 68949152257 scopus 로고    scopus 로고
    • Privacy-preserving secure relative localization in vehicular networks
    • Tang L., Hong X., Bradford P. G., Privacy-preserving secure relative localization in vehicular networks Security and Communication Networks 2008 1 3 195 204
    • (2008) Security and Communication Networks , vol.1 , Issue.3 , pp. 195-204
    • Tang, L.1    Hong, X.2    Bradford, P.G.3
  • 19
    • 46749099829 scopus 로고    scopus 로고
    • Providing VANET security through active position detection
    • Yan G., Olariu S., Weigle M. C., Providing VANET security through active position detection Computer Communications 2008 31 12 2883 2897
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2883-2897
    • Yan, G.1    Olariu, S.2    Weigle, M.C.3
  • 21
    • 17044379828 scopus 로고    scopus 로고
    • Real-time mobility tracking algorithms for cellular networks based on Kalman filtering
    • Zaidi Z. R., Mark B. L., Real-time mobility tracking algorithms for cellular networks based on Kalman filtering IEEE Transactions on Mobile Computing 2005 4 2 195 208
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.2 , pp. 195-208
    • Zaidi, Z.R.1    Mark, B.L.2
  • 23
    • 68949160369 scopus 로고    scopus 로고
    • Probabilistic evidence aggregation for malicious node position bounding in wireless networks
    • Laurendeau C., Barbeau M., Probabilistic evidence aggregation for malicious node position bounding in wireless networks Journal of Networks 2009 4 1 9 18
    • (2009) Journal of Networks , vol.4 , Issue.1 , pp. 9-18
    • Laurendeau, C.1    Barbeau, M.2
  • 24
    • 33746084519 scopus 로고    scopus 로고
    • Proceedings of the 2nd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 06) June 2006 San Francisco, Calif, USA Springer Lecture Notes in Computer Science
    • Chen Y., Kleisouris K., Li X., Trappe W., Martin R. P., The robustness of localization algorithms to signal strength attacks: a comparative study 4026 Proceedings of the 2nd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 06) June 2006 San Francisco, Calif, USA Springer 546 563 Lecture Notes in Computer Science
    • The robustness of localization algorithms to signal strength attacks: A comparative study , vol.4026 , pp. 546-563
    • Chen, Y.1    Kleisouris, K.2    Li, X.3    Trappe, W.4    Martin, R.P.5
  • 25
    • 34249810866 scopus 로고    scopus 로고
    • ANSI Standard X3.9-1978, 1978
    • American National Standards Institute, Programming Language FORTRAN. ANSI Standard X3.9-1978, 1978
    • Programming Language FORTRAN
  • 28
    • 68949100945 scopus 로고    scopus 로고
    • 911 Service, FCC Code of Federal Regulations, Title 47, Part 20, Section 20.18, October 2007
    • Federal Communications Commission,. 911 Service, FCC Code of Federal Regulations, Title 47, Part 20, Section 20.18, October 2007


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.