-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, p. 393C422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4 C422
, pp. 393
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of MobiCom, 2000.
-
(2000)
Proceedings of MobiCom
-
-
Karp, B.1
Kung, H.T.2
-
3
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
D. Liu and P. Ning, "Location-based pairwise key establishments for static sensor networks," in Proceedings ofACM SASN, 2003.
-
(2003)
Proceedings ofACM SASN
-
-
Liu, D.1
Ning, P.2
-
5
-
-
33751035788
-
Localization in sparse networks using sweeps
-
D. K. Goldenberg, P. Bihler, M. Cao, J. Fang, B. D. O. Anderson, A. S. Morse, and Y. R. Yang, "Localization in sparse networks using sweeps," in Proceedings of MobiCom, 2006, pp. 110-121.
-
(2006)
Proceedings of MobiCom
, pp. 110-121
-
-
Goldenberg, D.K.1
Bihler, P.2
Cao, M.3
Fang, J.4
Anderson, B.D.O.5
Morse, A.S.6
Yang, Y.R.7
-
6
-
-
42649116160
-
Secure localization algorithms for wireless sensor networks
-
April
-
A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro, "Secure localization algorithms for wireless sensor networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 96-101, April 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 96-101
-
-
Boukerche, A.1
Oliveira, H.2
Nakamura, E.3
Loureiro, A.4
-
7
-
-
48049111552
-
Guaranteeing the authenticity of location information
-
July-Sept
-
A.-T. Ferreres, B. Alvarez, and A. Garnacho, "Guaranteeing the authenticity of location information," IEEE Personal Commun. Mag., vol. 7, no. 3, pp. 72-80, July-Sept. 2008.
-
(2008)
IEEE Personal Commun. Mag
, vol.7
, Issue.3
, pp. 72-80
-
-
Ferreres, A.-T.1
Alvarez, B.2
Garnacho, A.3
-
8
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
Rome,Italy
-
A. Savvides, C.-C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proceedings ofMobiCom, Rome,Italy, 2001.
-
(2001)
Proceedings ofMobiCom
-
-
Savvides, A.1
Han, C.-C.2
Srivastava, M.3
-
10
-
-
0041973656
-
Ad hoc positioning system (aps) using aoa
-
San Francisco, CA, April
-
-, "Ad hoc positioning system (aps) using aoa," in Proceedings of INFOCOM, San Francisco, CA, April 2003.
-
(2003)
Proceedings of INFOCOM
-
-
-
12
-
-
27644573932
-
Robust distributed network localization with noisy range measurements
-
D. Moore, J. Leonard, D. Rus, and S. Teller, "Robust distributed network localization with noisy range measurements," in Proceedings of SenSys, 2004.
-
(2004)
Proceedings of SenSys
-
-
Moore, D.1
Leonard, J.2
Rus, D.3
Teller, S.4
-
13
-
-
85084163355
-
Robust positioning algorithms for distributed ad-hoc wireless sensor networks
-
C. Savarese and J. Rabay, "Robust positioning algorithms for distributed ad-hoc wireless sensor networks," in Proceedings of USENIX, 2002.
-
(2002)
Proceedings of USENIX
-
-
Savarese, C.1
Rabay, J.2
-
14
-
-
0036983357
-
The bits and flops of the n-hop multilateration primitive for node localization problems
-
A. Savvides, H. Park, and M. B. Srivastava, "The bits and flops of the n-hop multilateration primitive for node localization problems," in Proceedings of WSNA, 2002, pp. 112-121.
-
(2002)
Proceedings of WSNA
, pp. 112-121
-
-
Savvides, A.1
Park, H.2
Srivastava, M.B.3
-
15
-
-
33748075474
-
Robust distributed node localization with error management
-
J. Liu, Y. Zhang, and F. Zhao, "Robust distributed node localization with error management," in Proceedings of Mobilloc, 2006, pp. 250-261.
-
(2006)
Proceedings of Mobilloc
, pp. 250-261
-
-
Liu, J.1
Zhang, Y.2
Zhao, F.3
-
17
-
-
39749096536
-
Secure location verification with hidden and mobile base stations
-
S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, "Secure location verification with hidden and mobile base stations," IEEE Transactions on Mobile Computing, vol. 7, no. 4, pp. 470-483, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.4
, pp. 470-483
-
-
Capkun, S.1
Rasmussen, K.2
Cagalj, M.3
Srivastava, M.4
-
19
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proceedings of INFOCOM, 2003.
-
(2003)
Proceedings of INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
20
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
D. Liu, P. Ning, and W. K. Du, "Attack-resistant location estimation in sensor networks," in Proceedings of IPSN, 2005.
-
(2005)
Proceedings of IPSN
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
21
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proceedings of IPSN, 2005.
-
(2005)
Proceedings of IPSN
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
22
-
-
70349177807
-
Pollution attack: A new attack against localization in wireless sensor networks
-
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Pollution attack: A new attack against localization in wireless sensor networks," in Proceedings of WCNC, 2009.
-
(2009)
Proceedings of WCNC
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
23
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proceedings of ACM WiSe, 2004.
-
(2004)
Proceedings of ACM WiSe
-
-
Lazos, L.1
Poovendran, R.2
-
24
-
-
33144475948
-
HiRLoc: High-resolution robust localization for wireless sensor networks
-
Feb
-
-, "HiRLoc: high-resolution robust localization for wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 233-246, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
25
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proceedings of INFOCOM, 2005.
-
(2005)
Proceedings of INFOCOM
-
-
Capkun, S.1
Hubaux, J.-P.2
-
27
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
Piscataway, NJ, USA: IEEE Press
-
L. Lazos, R. Poovendran, and S. Čapkun, "ROPE: robust position estimation in wireless sensor networks," in Proceedings of IPSN. Piscataway, NJ, USA: IEEE Press, 2005, p. 43.
-
(2005)
Proceedings of IPSN
, pp. 43
-
-
Lazos, L.1
Poovendran, R.2
Čapkun, S.3
-
28
-
-
0012578409
-
Distance-bounding protocols
-
Springer-Verlag
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Proceedings of EUROCRYPT. Springer-Verlag, 1993, pp. 344-359.
-
(1993)
Proceedings of EUROCRYPT
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
29
-
-
48349098629
-
Secure hop-count based localization in wireless sensor networks
-
Y. Zeng, S. Zhang, S. Guo, and X. Li, "Secure hop-count based localization in wireless sensor networks," in Proceedings of CIS, 2007.
-
(2007)
Proceedings of CIS
-
-
Zeng, Y.1
Zhang, S.2
Guo, S.3
Li, X.4
-
30
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proceedings of ICDCS, 2005.
-
(2005)
Proceedings of ICDCS
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
32
-
-
36949013183
-
Drbts: Distributed reputation-based beacon trust system
-
Oct
-
A. Srinivasan, J. Teitelbaum, and J. Wu, "Drbts: Distributed reputation-based beacon trust system," in Proceedings of DASC, Oct. 2006, pp. 277-283.
-
(2006)
Proceedings of DASC
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
33
-
-
49449086367
-
Attack-resistant location estimation in wireless sensor networks
-
D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du, "Attack-resistant location estimation in wireless sensor networks," TISSEC, vol. 11, no. 4, pp. 1-39,2008.
-
(2008)
TISSEC
, vol.11
, Issue.4
, pp. 1-39
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, C.4
Du, W.K.5
-
34
-
-
35148872660
-
ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment
-
S. Misra, S. Bhardwaj, and G. Xue, "ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment," in Proceedings of MILCOM 2006, 2006.
-
(2006)
Proceedings of MILCOM 2006
-
-
Misra, S.1
Bhardwaj, S.2
Xue, G.3
-
36
-
-
70349169526
-
Anti-collusion position estimation inwireless sensor networks
-
N. Kiyavash and F. Koushanfar, "Anti-collusion position estimation inwireless sensor networks," in Proceedings of MASS, 2007.
-
(2007)
Proceedings of MASS
-
-
Kiyavash, N.1
Koushanfar, F.2
-
37
-
-
51349135576
-
Towards a theory of robust localization against malicious beacon nodes
-
S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, "Towards a theory of robust localization against malicious beacon nodes," in Proceedings of INFOCOM, 2008.
-
(2008)
Proceedings of INFOCOM
-
-
Zhong, S.1
Jadliwala, M.2
Upadhyaya, S.3
Qiao, C.4
-
39
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
April
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 4, pp. 829-835, April 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
40
-
-
74249106084
-
-
F. Anjum, S. Pandey, and P. Agrawal, Secure localization in sensor networks using transmission range variation, in Proceedings of MASS, Nov. 2005, pp. 9 pp.-203.
-
F. Anjum, S. Pandey, and P. Agrawal, "Secure localization in sensor networks using transmission range variation," in Proceedings of MASS, Nov. 2005, pp. 9 pp.-203.
-
-
-
-
41
-
-
84961644448
-
Context authentication using constrained channels
-
T. Kindberg, K. Zhang, and N. Shankar, "Context authentication using constrained channels," in Proceedings of WMCSA, 2002, p. 14.
-
(2002)
Proceedings of WMCSA
, pp. 14
-
-
Kindberg, T.1
Zhang, K.2
Shankar, N.3
-
42
-
-
33751507355
-
Secure location verification using radio broadcast
-
Oct.-Dec
-
A. Vora and M. Nesterenko, "Secure location verification using radio broadcast," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 377-385, Oct.-Dec. 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 377-385
-
-
Vora, A.1
Nesterenko, M.2
-
43
-
-
33746313270
-
LAD: Localization anomaly detection forwireless sensor networks
-
April
-
W. Du, L. Fang, and P. Ning, "LAD: Localization anomaly detection forwireless sensor networks," in Proceedings of IPDPS, April 2005, pp. 41a-41a.
-
(2005)
Proceedings of IPDPS
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
44
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
T. Leinmuller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Communications, vol. 13, no. 5, pp. 16-21,2006.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmuller, T.1
Schoch, E.2
Kargl, F.3
-
45
-
-
42549116750
-
A probabilistic approach to location verification in wireless sensor networks
-
June
-
E. Ekici, J. Mcnair, and D. Al-Abri, "A probabilistic approach to location verification in wireless sensor networks," in Proceedings of ICC, vol. 8, June 2006, pp. 3485-3490.
-
(2006)
Proceedings of ICC
, vol.8
, pp. 3485-3490
-
-
Ekici, E.1
Mcnair, J.2
Al-Abri, D.3
-
46
-
-
35548948372
-
Secure probabilistic location verification in randomly deployed wireless sensor networks
-
E. Ekici, S. Vural, J. McNair, and D. Al-Abri, "Secure probabilistic location verification in randomly deployed wireless sensor networks," Ad Hoc Networks, vol. 6, no. 2, pp. 195 - 209, 2008.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.2
, pp. 195-209
-
-
Ekici, E.1
Vural, S.2
McNair, J.3
Al-Abri, D.4
-
47
-
-
34548329877
-
Detecting phantom nodes in wireless sensor networks
-
May
-
J. Hwang, T. He, and Y. Kim, "Detecting phantom nodes in wireless sensor networks," in Proceedings of INFOCOM, May 2007, pp. 2391-2395.
-
(2007)
Proceedings of INFOCOM
, pp. 2391-2395
-
-
Hwang, J.1
He, T.2
Kim, Y.3
-
48
-
-
34848819422
-
Location verification algorithms for wireless sensor networks
-
June
-
Y. Wei, Z. Yu, and Y. Guan, "Location verification algorithms for wireless sensor networks," in Proceedings of ICDCS, June 2007, pp. 70-70.
-
(2007)
Proceedings of ICDCS
, pp. 70-70
-
-
Wei, Y.1
Yu, Z.2
Guan, Y.3
-
49
-
-
74249112919
-
SecMCL: A secure monte carlo localization algorithm for mobile sensor networks
-
Y. Zeng, J. Cao, J. Hong, S. Zhang, and L. Xie, "SecMCL: A secure monte carlo localization algorithm for mobile sensor networks," in accepted by WSNS, 2009.
-
(2009)
accepted by WSNS
-
-
Zeng, Y.1
Cao, J.2
Hong, J.3
Zhang, S.4
Xie, L.5
|