-
1
-
-
79960761886
-
Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey
-
In press
-
N. Labraoui, M. Gueroui, M. Aliouat and T. Zia, "Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey", Ad hoc & Sensor Networks, International Journal (In press), 2010.
-
(2010)
Ad Hoc & Sensor Networks, International Journal
-
-
Labraoui, N.1
Gueroui, M.2
Aliouat, M.3
Zia, T.4
-
3
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
C. Y. Chong and S. P. Kumar, "Sensor networks: evolution, opportunities, and challenges," In Proc. IEEE, 2003, vol. 91, no. 8, pp. 1247-1256.
-
Proc. IEEE, 2003
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.P.2
-
4
-
-
0034229951
-
PicoRadio supports ad hoc ultra-low power wireless networking
-
J. M. Rahaey, M. J. Ammer, J. L. da Silva, Jr., D. Patel, and S. Roundy, "PicoRadio supports ad hoc ultra-low power wireless networking," Computer, 2002, vol. 33, no. 7, pp. 42-48.
-
(2002)
Computer
, vol.33
, Issue.7
, pp. 42-48
-
-
Rahaey, J.M.1
Ammer, M.J.2
Da Silva Jr., J.L.3
Patel, D.4
Roundy, S.5
-
5
-
-
48049111825
-
-
tech. report NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ.
-
M. Pirreti, N. Vijaykrishnan, P. McDaniel, and B. Madan, "SLAT: Secure Localization with Attack Tolerance", tech. report NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ., 2005.
-
(2005)
SLAT: Secure Localization with Attack Tolerance
-
-
Pirreti, M.1
Vijaykrishnan, N.2
McDaniel, P.3
Madan, B.4
-
7
-
-
0033872896
-
RADAR:An In-building RF-based User Location and Tracking System
-
P. Bahl and V. N. Padmanabhan, " RADAR:An In-building RF-based User Location and Tracking System", In Proc. of INFOCOM, Nineteenth Annual Joint Conference of the IEEE Computer and Communications, 2000, pp. 775-784.
-
Proc. of INFOCOM, Nineteenth Annual Joint Conference of the IEEE Computer and Communications, 2000
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
9
-
-
36949013183
-
DRBTS: Distributed Reputation-based Beacon Trust System
-
A. Srinivasan, J. Teitelbaum, and J. Wu, "DRBTS: Distributed Reputation-based Beacon Trust System", In Proc. Of the 2nd IEEE Int'l Symposium on Dependable, Autonomic and Secure Computing, pp 277-283, 2006.
-
(2006)
Proc. of the 2nd IEEE Int'l Symposium on Dependable, Autonomic and Secure Computing
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
10
-
-
27944459744
-
Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks
-
D. Liu, P. Ning, and W. Du, "Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks", In Proc. of IEEE ICDCS, pp 609-619, 2005.
-
(2005)
Proc. of IEEE ICDCS
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
11
-
-
46849122472
-
Cluster-BasedMinimun Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks
-
C.Wang, A. Liu, and P. Ning, "Cluster-BasedMinimun Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks", In Proc. of the Int'l Conf. on Wireless Algorithms, Systems and Applications, pp 29-37, 2007.
-
(2007)
Proc. of the Int'l Conf. on Wireless Algorithms, Systems and Applications
, pp. 29-37
-
-
Wang, C.1
Liu, A.2
Ning, P.3
-
12
-
-
33144467507
-
Robust Statistical Methods for Securing Wireless Localization in Sensor Networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks", In Proc. of IEEE IPSN, pp 91-98, 2005.
-
(2005)
Proc. of IEEE IPSN
, pp. 91-98
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
13
-
-
84866469313
-
SeRLoc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "SeRLoc: robust localization for wireless sensor networks,", ACM Transactions on Sensor Networks, vol. 1, no. 1, pp. 73-100, 2005.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
14
-
-
33144475948
-
HiRLoc: High-resolution robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "HiRLoc: high-resolution robust localization for wireless sensor networks", IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 233-246, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
15
-
-
70350638584
-
Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
-
H. Chen,W. Lou, and Z.Wang, "Conflicting-set-based wormhole attack resistant localization in wireless sensor networks" In Proc. of the 6th International Conference on Ubiquitous Intelligence and Computing, 2009, pp. 296-309.
-
Proc. of the 6th International Conference on Ubiquitous Intelligence and Computing, 2009
, pp. 296-309
-
-
Chen, H.1
Lou, W.2
Wang, Z.3
-
16
-
-
77958144705
-
Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks
-
J. Wu, H. Chen, W. Lou, Z. Wang, and Z. Wang, "Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks", In Proc. of the 5th IEEE International Conference on Networking, Architecture, and Storage, 2010, pp. 79-88.
-
Proc. of the 5th IEEE International Conference on Networking, Architecture, and Storage, 2010
, pp. 79-88
-
-
Wu, J.1
Chen, H.2
Lou, W.3
Wang, Z.4
Wang, Z.5
-
20
-
-
0041973497
-
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks", In Proc of INFOCOM, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 2003, vol. 3, pp. 1976-1986.
-
Proc of INFOCOM, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 2003
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
22
-
-
84923996598
-
-
Cambridge University Press, New York, NY, USA
-
A. Goldsmith, Wireless Communications, Cambridge University Press, New York, NY, USA, 2005.
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
-
23
-
-
0003847709
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
T. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2001.
-
(2001)
Wireless Communications: Principles and Practice
-
-
Rappaport, T.1
-
24
-
-
36348954892
-
TIM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks
-
P.V. Tran, LX Hung, Y.K. Lee, S. Lee, S. and H. Lee, " TIM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks", In Proc. of the 4th IEEE Consumer Communications and Networking Conference , 2007, pp. 593-598
-
Proc. of the 4th IEEE Consumer Communications and Networking Conference, 2007
, pp. 593-598
-
-
Tran, P.V.1
Hung, L.X.2
Lee, Y.K.3
Lee, S.4
Lee, S.H.5
|