메뉴 건너뛰기




Volumn 6, Issue 6, 2011, Pages 460-470

Secure localization in wireless sensor networks: A survey

Author keywords

Localization; Security; Wireless sensor network

Indexed keywords

ANCHOR NODES; HOSTILE ENVIRONMENTS; LOCALIZATION; LOCALIZATION INFORMATION; RESEARCH SUBJECTS; SECURE LOCALIZATION; SECURITY; SURVEY RESEARCH; SYBIL ATTACK; WIRELESS SENSOR;

EID: 80052054485     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.6.6.460-470     Document Type: Article
Times cited : (45)

References (74)
  • 4
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • August
    • J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor networks: a survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, August 2008.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 7
    • 73049092203 scopus 로고    scopus 로고
    • A simple approach of range-based positioning with low computational complexity
    • December
    • S. Zhu and Z. Ding, "A simple approach of range-based positioning with low computational complexity," IEEE Transactions on Wireless Communications, vol. 8, no. 12, December 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , pp. 12
    • Zhu, S.1    Ding, Z.2
  • 8
    • 77955761958 scopus 로고    scopus 로고
    • Udp identification and error mitigation in toa-based indoor localization systems using neural network architecture
    • July
    • M. Heidari, N. Alsindi, and K. Pahlavan, "Udp identification and error mitigation in toa-based indoor localization systems using neural network architecture," IEEE Transactions on Wireless Communications, vol. 8, no. 7, July 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.7
    • Heidari, M.1    Alsindi, N.2    Pahlavan, K.3
  • 9
    • 73049116477 scopus 로고    scopus 로고
    • Localization with a mobile beacon based on geometric constraints in wireless sensor networks
    • December
    • S. Lee, E. Kim, C. Kim, and K. Kim, "Localization with a mobile beacon based on geometric constraints in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 5801-5805, December 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.7 , pp. 5801-5805
    • Lee, S.1    Kim, E.2    Kim, C.3    Kim, K.4
  • 10
    • 77949555401 scopus 로고    scopus 로고
    • Mobile element assisted cooperative localization for wireless sensor networks with obstacles
    • March
    • H. Chen, Q. Shi, H. Vincent Poor, and K. Sezaki, "Mobile element assisted cooperative localization for wireless sensor networks with obstacles," IEEE Transactions on Wireless Communications, vol. 9, no. 3, March 2010.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.3
    • Chen, H.1    Shi, Q.2    Vincent Poor, H.3    Sezaki, K.4
  • 18
    • 48049111552 scopus 로고    scopus 로고
    • Guaranteeing the authenticity of location information
    • July
    • A. Ferreres, B. Alvarez, and A. Garnacho, "Guaranteeing the authenticity of location information," IEEE Pervasive Computing, vol. 7, no. 3, pp. 72-80, July 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.3 , pp. 72-80
    • Ferreres, A.1    Alvarez, B.2    Garnacho, A.3
  • 20
    • 80052040344 scopus 로고    scopus 로고
    • Defense Against Node Compromise in Sensor Network Security
    • X. Chen, Defense Against Node Compromise in Sensor Network Security. FIU Electronic Theses and Dissertations, http://digitalcommons.fiu.edu/etd/7, 2007.
    • (2007) FIU Electronic Theses and Dissertations
    • Chen, X.1
  • 21
    • 77951458841 scopus 로고    scopus 로고
    • Efficient and distributed detection of node replication attacks in mobile sensor networks
    • VTC Fall, September
    • C. Yu, C. Lu, and S. Kuo, "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proceedings of Vehicular Technology Conference Fall (VTC Fall), September 2009, pp. 1-5.
    • (2009) Proceedings of Vehicular Technology Conference Fall , pp. 1-5
    • Yu, C.1    Lu, C.2    Kuo, S.3
  • 26
    • 0019581450 scopus 로고
    • An overview on the time delay estimate in active and passive systems for target localization
    • June
    • A. Quazi, "An overview on the time delay estimate in active and passive systems for target localization," IEEE Transactions on Acoustics Speech and Signal Processing, vol. 29, no. 3, pp. 527-533, June 1981.
    • (1981) IEEE Transactions on Acoustics Speech and Signal Processing , vol.29 , Issue.3 , pp. 527-533
    • Quazi, A.1
  • 28
    • 43249085263 scopus 로고    scopus 로고
    • Security analysis on node localization systems of wireless sensor networks
    • April
    • X. Cao, B. Yu, G. Chen, and F. Ren, "Security analysis on node localization systems of wireless sensor networks," China Journal Of Software, vol. 19, no. 4, pp. 879-887, April 2008.
    • (2008) China Journal of Software , vol.19 , Issue.4 , pp. 879-887
    • Cao, X.1    Yu, B.2    Chen, G.3    Ren, F.4
  • 38
    • 33947309703 scopus 로고    scopus 로고
    • Secure Localization and Authentication In Ultra-wideband Sensor Networks
    • Y. Zhang, W Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," in IEEE Journal on Selected Areas in Communication, vol. 24, no. 4, 2006, pp. 829-835.
    • (2006) IEEE Journal on Selected Areas in Communication , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 39
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • July
    • D. He, L. Cui, and H. Huang, "Design and verification of enhanced secure localization scheme in wireless sensor networks," in IEEE transactions on Parallel and Distributed Systems, vol. 20, no. 7, July 2009.
    • (2009) IEEE Transactions on Parallel and Distributed Systems , vol.20 , Issue.7
    • He, D.1    Cui, L.2    Huang, H.3
  • 42
    • 84869175444 scopus 로고    scopus 로고
    • Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
    • November
    • J. Alfaro, M. Barbeau, and E. Kranakis, "Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes," in Annals of Telecommunications, November 2010, pp. 1-18.
    • (2010) Annals of Telecommunications , pp. 1-18
    • Alfaro, J.1    Barbeau, M.2    Kranakis, E.3
  • 45
    • 33144475948 scopus 로고    scopus 로고
    • HiRLoc: High-resolution robust localization for wireless sensor networks
    • L. Lazos and R. Poovendran, "HiRLoc: High-resolution robust localization for wireless sensor networks," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 233-246.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 233-246
    • Lazos, L.1    Poovendran, R.2
  • 47
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signature of multicast streams over lossy channels
    • May
    • A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient authentication and signature of multicast streams over lossy channels," in Proceedings of Oakland, May 2000, pp. 56-73.
    • (2000) Proceedings of Oakland , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 49
    • 42549116750 scopus 로고    scopus 로고
    • A probabilistic approach to location verification in wireless sensor networks
    • June
    • E. Ekici, J. Mcnair, and D. Al-Abri, "A probabilistic approach to location verification in wireless sensor networks," in IEEE International Conference on Communications, vol. 8, June 2006, pp. 3485-3490.
    • (2006) IEEE International Conference on Communications , vol.8 , pp. 3485-3490
    • Ekici, E.1    McNair, J.2    Al-Abri, D.3
  • 50
    • 35548948372 scopus 로고    scopus 로고
    • Secure probabilistic location verification in randomly deployed wireless sensor networks
    • E. Ekici, S. Vural, J. Mcnair, and D. Al-Abri, "Secure probabilistic location verification in randomly deployed wireless sensor networks," in Ad Hoc Networks, vol. 6, no. 2, 2008, pp. 195-209.
    • (2008) Ad Hoc Networks , vol.6 , Issue.2 , pp. 195-209
    • Ekici, E.1    Vural, S.2    McNair, J.3    Al-Abri, D.4
  • 53
    • 33744548460 scopus 로고    scopus 로고
    • LAD: Localization anomaly detection forwireless sensor networks
    • W. Du, L. Fang, and P. Ning, "LAD: Localization anomaly detection forwireless sensor networks," in The Journal of Parallel and Distributed Computing, vol. 66, no. 7, 2006, pp. 874-886.
    • (2006) The Journal of Parallel and Distributed Computing , vol.66 , Issue.7 , pp. 874-886
    • Du, W.1    Fang, L.2    Ning, P.3
  • 62
    • 70349177807 scopus 로고    scopus 로고
    • Pollution attack: A new attack against localization in wireless sensor networks
    • April
    • Y. Zeng, J. Cao, Z. S., S. Guo, and L. Xie, "Pollution attack: A new attack against localization in wireless sensor networks," in Proceedings of Wireless Communications and Networking Conference, April 2009, pp. 2038-2043.
    • (2009) Proceedings of Wireless Communications and Networking Conference , pp. 2038-2043
    • Zeng, Y.1    Cao, J.2
  • 63
    • 64049093544 scopus 로고    scopus 로고
    • Secure and robust localization in a wireless ad hoc environment
    • S. Misra, G. Xue, and S. Bhardwaj, "Secure and robust localization in a wireless ad hoc environment," in IEEE Transactions on Vehicular Technology, vol. 58, no. 3, 2009, pp. 1480-1489.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.3 , pp. 1480-1489
    • Misra, S.1    Xue, G.2    Bhardwaj, S.3
  • 70
    • 79551638269 scopus 로고    scopus 로고
    • Secure two phase geographic forwarding routing protocol in wireless multimedia sensor networks
    • December
    • T. Mulugeta, L. Shu, M. Hauswirth, C. M., T. Hara, and S. Nishio, "Secure two phase geographic forwarding routing protocol in wireless multimedia sensor networks," in the IEEE Global Communication Conference, December 2010, pp. 1-6.
    • (2010) The IEEE Global Communication Conference , pp. 1-6
    • Mulugeta, T.1    Shu, L.2    Hauswirth, M.3
  • 73
    • 78651550185 scopus 로고    scopus 로고
    • Power-aware and reliable sensor selection based on trust for wireless sensor networks
    • January
    • G. Han, L. Shu, J. Ma, J. Park, and J. Ni, "Power-aware and reliable sensor selection based on trust for wireless sensor networks," in Journal of Communications, vol. 5, no. 1, January 2010, pp. 23-30.
    • (2010) Journal of Communications , vol.5 , Issue.1 , pp. 23-30
    • Han, G.1    Shu, L.2    Ma, J.3    Park, J.4    Ni, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.