-
4
-
-
46449122114
-
Wireless sensor networks: A survey
-
August
-
J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor networks: a survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, August 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
5
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
74249104852
-
Secure localization and location verification in wireless sensor networks
-
October
-
Y. Zeng, J. Cao, J. Hong, and L. Xie, "Secure localization and location verification in wireless sensor networks," in IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, October 2009, pp. 864-869.
-
(2009)
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems
, pp. 864-869
-
-
Zeng, Y.1
Cao, J.2
Hong, J.3
Xie, L.4
-
7
-
-
73049092203
-
A simple approach of range-based positioning with low computational complexity
-
December
-
S. Zhu and Z. Ding, "A simple approach of range-based positioning with low computational complexity," IEEE Transactions on Wireless Communications, vol. 8, no. 12, December 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, pp. 12
-
-
Zhu, S.1
Ding, Z.2
-
8
-
-
77955761958
-
Udp identification and error mitigation in toa-based indoor localization systems using neural network architecture
-
July
-
M. Heidari, N. Alsindi, and K. Pahlavan, "Udp identification and error mitigation in toa-based indoor localization systems using neural network architecture," IEEE Transactions on Wireless Communications, vol. 8, no. 7, July 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.7
-
-
Heidari, M.1
Alsindi, N.2
Pahlavan, K.3
-
9
-
-
73049116477
-
Localization with a mobile beacon based on geometric constraints in wireless sensor networks
-
December
-
S. Lee, E. Kim, C. Kim, and K. Kim, "Localization with a mobile beacon based on geometric constraints in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 5801-5805, December 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.7
, pp. 5801-5805
-
-
Lee, S.1
Kim, E.2
Kim, C.3
Kim, K.4
-
10
-
-
77949555401
-
Mobile element assisted cooperative localization for wireless sensor networks with obstacles
-
March
-
H. Chen, Q. Shi, H. Vincent Poor, and K. Sezaki, "Mobile element assisted cooperative localization for wireless sensor networks with obstacles," IEEE Transactions on Wireless Communications, vol. 9, no. 3, March 2010.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.3
-
-
Chen, H.1
Shi, Q.2
Vincent Poor, H.3
Sezaki, K.4
-
12
-
-
0003080798
-
The anatomy of a context-aware application
-
A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, "The anatomy of a context-aware application," in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 59-68.
-
(1999)
Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 59-68
-
-
Harter, A.1
Hopper, A.2
Steggles, P.3
Ward, A.4
Webster, P.5
-
16
-
-
0035013232
-
Convex position estimation in wireless sensor networks
-
L. Doherty, K. Pister, and L. Ghaoui, "Convex position estimation in wireless sensor networks," in Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2001, pp. 1655-1663.
-
(2001)
Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1655-1663
-
-
Doherty, L.1
Pister, K.2
Ghaoui, L.3
-
17
-
-
0242612017
-
Localization from mere connectivity
-
Y. Shang, W. Ruml, Y. Zhang, and M. Fromherz, "Localization from mere connectivity," in Proceedings of the 4th International ACM Symposium on Mobile Ad Hoc Networking & Computing, 2003, pp. 201-212.
-
(2003)
Proceedings of the 4th International ACM Symposium on Mobile Ad Hoc Networking & Computing
, pp. 201-212
-
-
Shang, Y.1
Ruml, W.2
Zhang, Y.3
Fromherz, M.4
-
18
-
-
48049111552
-
Guaranteeing the authenticity of location information
-
July
-
A. Ferreres, B. Alvarez, and A. Garnacho, "Guaranteeing the authenticity of location information," IEEE Pervasive Computing, vol. 7, no. 3, pp. 72-80, July 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.3
, pp. 72-80
-
-
Ferreres, A.1
Alvarez, B.2
Garnacho, A.3
-
19
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
A. Savvides, C.-C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proceedings of the 7th annual international conference on Mobile computing and networking, 2001, pp. 166-179.
-
(2001)
Proceedings of the 7th Annual International Conference On Mobile Computing and Networking
, pp. 166-179
-
-
Savvides, A.1
Han, C.-C.2
Srivastava, M.3
-
20
-
-
80052040344
-
Defense Against Node Compromise in Sensor Network Security
-
X. Chen, Defense Against Node Compromise in Sensor Network Security. FIU Electronic Theses and Dissertations, http://digitalcommons.fiu.edu/etd/7, 2007.
-
(2007)
FIU Electronic Theses and Dissertations
-
-
Chen, X.1
-
21
-
-
77951458841
-
Efficient and distributed detection of node replication attacks in mobile sensor networks
-
VTC Fall, September
-
C. Yu, C. Lu, and S. Kuo, "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proceedings of Vehicular Technology Conference Fall (VTC Fall), September 2009, pp. 1-5.
-
(2009)
Proceedings of Vehicular Technology Conference Fall
, pp. 1-5
-
-
Yu, C.1
Lu, C.2
Kuo, S.3
-
22
-
-
51849154670
-
Real-time Detection of Clone Attacks In Wireless Sensor Networks
-
June
-
K. Xing, F. Liu, C. Cheng, and D. Du, "Real-time detection of clone attacks in wireless sensor networks," in Proceedings of the 28th International Conference on Distributed Computing Systems, June 2008, pp. 3-10.
-
(2008)
Proceedings of the 28th International Conference on Distributed Computing Systems
, pp. 3-10
-
-
Xing, K.1
Liu, F.2
Cheng, C.3
Du, D.4
-
23
-
-
33744472182
-
Preventing impersonation attacks in manet with multi-factor authentication
-
Ad Hoc, and Wireless Networks, April
-
K. Glynos, P. Kotzanikolaou, and C. Douligeris, "Preventing impersonation attacks in manet with multi-factor authentication," in Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, April 2005, pp. 59-64.
-
(2005)
Proceedings of the Third International Symposium on Modeling and Optimization in Mobile
, pp. 59-64
-
-
Glynos, K.1
Kotzanikolaou, P.2
Douligeris, C.3
-
24
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
April
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proceedings of the Third International Symposium on Information Processing in Sensor Networks, April 2004, pp. 259-268.
-
(2004)
Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
26
-
-
0019581450
-
An overview on the time delay estimate in active and passive systems for target localization
-
June
-
A. Quazi, "An overview on the time delay estimate in active and passive systems for target localization," IEEE Transactions on Acoustics Speech and Signal Processing, vol. 29, no. 3, pp. 527-533, June 1981.
-
(1981)
IEEE Transactions on Acoustics Speech and Signal Processing
, vol.29
, Issue.3
, pp. 527-533
-
-
Quazi, A.1
-
27
-
-
80052440190
-
A novel secure localization scheme against collaborative collusion in wireless sensor networks
-
July
-
J. Jiang, G. Han, S. L. H. Chao, and S. Nishio, "A novel secure localization scheme against collaborative collusion in wireless sensor networks," in the 7th International Wireless Communications & Mobile Computing Conference, July 2011.
-
(2011)
The 7th International Wireless Communications & Mobile Computing Conference
-
-
Jiang, J.1
Han, G.2
Chao, S.L.H.3
Nishio, S.4
-
28
-
-
43249085263
-
Security analysis on node localization systems of wireless sensor networks
-
April
-
X. Cao, B. Yu, G. Chen, and F. Ren, "Security analysis on node localization systems of wireless sensor networks," China Journal Of Software, vol. 19, no. 4, pp. 879-887, April 2008.
-
(2008)
China Journal of Software
, vol.19
, Issue.4
, pp. 879-887
-
-
Cao, X.1
Yu, B.2
Chen, G.3
Ren, F.4
-
29
-
-
24744451603
-
Resisting flooding attacks in ad hoc networks
-
Z.Y. April
-
P. Yi, Z. Dai, Z. Y., and S. Zhang, "Resisting flooding attacks in ad hoc networks," in Proceedings of the International Conference on Information Technology: Coding and Computing, no. 2, April 2005, pp. 657-662.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing
, vol.2
, pp. 657-662
-
-
Yi, P.1
Dai, Z.2
Zhang, S.3
-
32
-
-
39749096536
-
Secure location verification with hidden and mobile base stations
-
S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, "Secure location verification with hidden and mobile base stations," in IEEE Transactions on Mobile Computing, vol. 7, no. 4, 2008, pp. 470-483.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.4
, pp. 470-483
-
-
Capkun, S.1
Rasmussen, K.2
Cagalj, M.3
Srivastava, M.4
-
34
-
-
33144454801
-
Secure positioning in wireless network
-
S. Capkun and J. Hubaux, "Secure positioning in wireless network," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 221-232.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.2
-
35
-
-
39049142710
-
Secure localization with hidden and mobile base stations
-
S. Capkun, M. Cagalj, and M. Srivastava, "Secure localization with hidden and mobile base stations," in Proceedings of the 25th IEEE International Conference on Computer Communications, 2006, pp. 1-10.
-
(2006)
Proceedings of the 25th IEEE International Conference on Computer Communications
, pp. 1-10
-
-
Capkun, S.1
Cagalj, M.2
Srivastava, M.3
-
36
-
-
33750303903
-
Secure localization in sensor networks using transmission range variation
-
November
-
F. Anjum, S. Pandey, and P. Agrawal, "Secure localization in sensor networks using transmission range variation," in Proceedings of the 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, November 2005, pp. 203-211.
-
(2005)
Proceedings of the 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
, pp. 203-211
-
-
Anjum, F.1
Pandey, S.2
Agrawal, P.3
-
37
-
-
4544365403
-
-
March
-
S. Ganu, A. Krishnakumar, and P. Krishnan, "Infrastructure-based location estimation in wlan networks," in IEEE Wireless Communications and Networking Conference, March 2004, pp. 465-470.
-
(2004)
Infrastructure-based Location Estimation in Wlan Networks
, pp. 465-470
-
-
Ganu, S.1
Krishnakumar, A.2
Krishnan, P.3
-
38
-
-
33947309703
-
Secure Localization and Authentication In Ultra-wideband Sensor Networks
-
Y. Zhang, W Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," in IEEE Journal on Selected Areas in Communication, vol. 24, no. 4, 2006, pp. 829-835.
-
(2006)
IEEE Journal on Selected Areas in Communication
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
39
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
July
-
D. He, L. Cui, and H. Huang, "Design and verification of enhanced secure localization scheme in wireless sensor networks," in IEEE transactions on Parallel and Distributed Systems, vol. 20, no. 7, July 2009.
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.7
-
-
He, D.1
Cui, L.2
Huang, H.3
-
41
-
-
67650320792
-
Secure localization of nodes in wireless sensor networks with limited number of truth tellers
-
J. Alfaro, M. Barbeau, and E. Kranakis, "Secure localization of nodes in wireless sensor networks with limited number of truth tellers," in Proceedings of the 7th Annual Communications Networks and Services Research Conference, 2009, pp. 86-93.
-
(2009)
Proceedings of the 7th Annual Communications Networks and Services Research Conference
, pp. 86-93
-
-
Alfaro, J.1
Barbeau, M.2
Kranakis, E.3
-
42
-
-
84869175444
-
Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
-
November
-
J. Alfaro, M. Barbeau, and E. Kranakis, "Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes," in Annals of Telecommunications, November 2010, pp. 1-18.
-
(2010)
Annals of Telecommunications
, pp. 1-18
-
-
Alfaro, J.1
Barbeau, M.2
Kranakis, E.3
-
45
-
-
33144475948
-
HiRLoc: High-resolution robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "HiRLoc: High-resolution robust localization for wireless sensor networks," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 233-246.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
46
-
-
48349098629
-
Secure hop-count based localization in wireless sensor networks
-
December
-
Y. Zeng, S. Zhang, S. Guo, and L. Xie, "Secure hop-count based localization in wireless sensor networks," in 2007 International Conference on Computational Intelligence and Security, December 2007, pp. 907-911.
-
(2007)
2007 International Conference on Computational Intelligence and Security
, pp. 907-911
-
-
Zeng, Y.1
Zhang, S.2
Guo, S.3
Xie, L.4
-
47
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient authentication and signature of multicast streams over lossy channels," in Proceedings of Oakland, May 2000, pp. 56-73.
-
(2000)
Proceedings of Oakland
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
49
-
-
42549116750
-
A probabilistic approach to location verification in wireless sensor networks
-
June
-
E. Ekici, J. Mcnair, and D. Al-Abri, "A probabilistic approach to location verification in wireless sensor networks," in IEEE International Conference on Communications, vol. 8, June 2006, pp. 3485-3490.
-
(2006)
IEEE International Conference on Communications
, vol.8
, pp. 3485-3490
-
-
Ekici, E.1
McNair, J.2
Al-Abri, D.3
-
50
-
-
35548948372
-
Secure probabilistic location verification in randomly deployed wireless sensor networks
-
E. Ekici, S. Vural, J. Mcnair, and D. Al-Abri, "Secure probabilistic location verification in randomly deployed wireless sensor networks," in Ad Hoc Networks, vol. 6, no. 2, 2008, pp. 195-209.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.2
, pp. 195-209
-
-
Ekici, E.1
Vural, S.2
McNair, J.3
Al-Abri, D.4
-
51
-
-
77958144705
-
Labelbased dv-hop localization againstwormhole attacks in wireless sensor networks
-
September
-
J. Wu, H. Chen, W. Lou, Z. Wang, and Z. Wang, "Labelbased dv-hop localization againstwormhole attacks in wireless sensor networks," in Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage, September 2010, pp. 79-88.
-
(2010)
Proceedings of the 5th IEEE International Conference On Networking, Architecture, and Storage
, pp. 79-88
-
-
Wu, J.1
Chen, H.2
Lou, W.3
Wang, Z.4
Wang, Z.5
-
53
-
-
33744548460
-
LAD: Localization anomaly detection forwireless sensor networks
-
W. Du, L. Fang, and P. Ning, "LAD: Localization anomaly detection forwireless sensor networks," in The Journal of Parallel and Distributed Computing, vol. 66, no. 7, 2006, pp. 874-886.
-
(2006)
The Journal of Parallel and Distributed Computing
, vol.66
, Issue.7
, pp. 874-886
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
54
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 2005, pp. 609-691.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 609-691
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
55
-
-
36949013183
-
DRBTS: Distributed reputation-based beacon trust system
-
A. Srinivasan, J. Teitelbaum, and J. Wu, "DRBTS: Distributed reputation-based beacon trust system," in Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006, pp. 277-283.
-
(2006)
Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
57
-
-
73149096489
-
Tolerant majoritycolluding attacks for secure localization in wireless sensor networks
-
X. Wang, L. Qian, and H. Jiang, "Tolerant majoritycolluding attacks for secure localization in wireless sensor networks," in Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, pp. 1-5.
-
(2009)
Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-5
-
-
Wang, X.1
Qian, L.2
Jiang, H.3
-
58
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), 2005, pp. 91-98.
-
(2005)
Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 91-98
-
-
Li, Z.1
Trappe, W.2
Nath, B.3
-
59
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
April
-
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), April 2005, pp. 99-106.
-
(2005)
Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
60
-
-
49449086367
-
Attackresistant location estimation in sensor networks
-
D. Liu, P. Ning, A. Liu, W. Wang, and W. Du, "Attackresistant location estimation in sensor networks," in ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 4, 2005, pp. 1-39.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, Issue.4
, pp. 1-39
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, W.4
Du, W.5
-
61
-
-
70349281104
-
Towards a theory of robust localization against malicious beacon nodes
-
S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, "Towards a theory of robust localization against malicious beacon nodes," in Proceedings of the 27th IEEE International Conference on Computer Communication, 2008, pp. 1391-1399.
-
(2008)
Proceedings of the 27th IEEE International Conference on Computer Communication
, pp. 1391-1399
-
-
Zhong, S.1
Jadliwala, M.2
Upadhyaya, S.3
Qiao, C.4
-
62
-
-
70349177807
-
Pollution attack: A new attack against localization in wireless sensor networks
-
April
-
Y. Zeng, J. Cao, Z. S., S. Guo, and L. Xie, "Pollution attack: A new attack against localization in wireless sensor networks," in Proceedings of Wireless Communications and Networking Conference, April 2009, pp. 2038-2043.
-
(2009)
Proceedings of Wireless Communications and Networking Conference
, pp. 2038-2043
-
-
Zeng, Y.1
Cao, J.2
-
63
-
-
64049093544
-
Secure and robust localization in a wireless ad hoc environment
-
S. Misra, G. Xue, and S. Bhardwaj, "Secure and robust localization in a wireless ad hoc environment," in IEEE Transactions on Vehicular Technology, vol. 58, no. 3, 2009, pp. 1480-1489.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.3
, pp. 1480-1489
-
-
Misra, S.1
Xue, G.2
Bhardwaj, S.3
-
64
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson, "Distance bounding protocols: Authentication logic analysis and collusion attacks," in Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks, 2007, pp. 279-298.
-
(2007)
Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks
, pp. 279-298
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.4
Syverson, P.5
-
65
-
-
33751507355
-
Secure location verification using radio broadcast
-
December
-
A. Vora and M. Nesterenko, "Secure location verification using radio broadcast," in IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, December 2006, pp. 377-385.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 377-385
-
-
Vora, A.1
Nesterenko, M.2
-
66
-
-
34548329877
-
Detecting phantom nodes in wireless sensor networks
-
May
-
J. Hwang, T. He, and Y. Kim, "Detecting phantom nodes in wireless sensor networks," in Proceedings of the 26th IEEE International Conference on Computer Communications, May 2007, pp. 2391 - 2395.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications
, pp. 2391-2395
-
-
Hwang, J.1
He, T.2
Kim, Y.3
-
67
-
-
34848819422
-
Location verification algorithms for wireless sensor networks
-
June
-
Y. Wei, Z. Yu, and Y. Guan, "Location verification algorithms for wireless sensor networks," in Proceedings of the 27th International Conference on Distributed Computing Systems, June 2007, p. 70.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems
, pp. 70
-
-
Wei, Y.1
Yu, Z.2
Guan, Y.3
-
68
-
-
45849129054
-
-
T.S. June
-
S. Delaet, P. Mandal, M. Rokicki, and T. S., "Deterministic secure positioning in wireless sensor networks," in IEEE International Conference on Distributed Computing in Sensor Networks (DCOSS), June 2008, pp. 469-477.
-
(2008)
Deterministic Secure Positioning in Wireless Sensor Networks
, pp. 469-477
-
-
Delaet, S.1
Mandal, P.2
Rokicki, M.3
-
69
-
-
78549235795
-
Security verification of location estimate in wireless sensor networks
-
C. Li, F. Chen, Y. Zhan, and L. Wang, "Security verification of location estimate in wireless sensor networks," in Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1-4.
-
(2010)
Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)
, pp. 1-4
-
-
Li, C.1
Chen, F.2
Zhan, Y.3
Wang, L.4
-
70
-
-
79551638269
-
Secure two phase geographic forwarding routing protocol in wireless multimedia sensor networks
-
December
-
T. Mulugeta, L. Shu, M. Hauswirth, C. M., T. Hara, and S. Nishio, "Secure two phase geographic forwarding routing protocol in wireless multimedia sensor networks," in the IEEE Global Communication Conference, December 2010, pp. 1-6.
-
(2010)
The IEEE Global Communication Conference
, pp. 1-6
-
-
Mulugeta, T.1
Shu, L.2
Hauswirth, M.3
-
71
-
-
80052077289
-
Secured geographic forwarding in wireless multimedia sensor networks
-
to appear
-
T. Mulugeta, L. Shu, M. Hauswirth, Z. Zhou, and S. Nishio, "Secured geographic forwarding in wireless multimedia sensor networks," in Journal of Information Processing, 2010 (to appear).
-
(2010)
Journal of Information Processing
-
-
Mulugeta, T.1
Shu, L.2
Hauswirth, M.3
Zhou, Z.4
Nishio, S.5
-
72
-
-
85164894913
-
-
L. He, Y. Zhang, L. Shu, A. Vasilakos, and M. Park, "Energy efficient location-dependent key management scheme for wireless sensor networks," in the IEEE Global Communication Conference, 2010, pp. 1-5.
-
(2010)
Energy Efficient Location-dependent Key Management Scheme for Wireless Sensor Networks
, pp. 1-5
-
-
He, L.1
Zhang, Y.2
Shu, L.3
Vasilakos, A.4
Park, M.5
-
73
-
-
78651550185
-
Power-aware and reliable sensor selection based on trust for wireless sensor networks
-
January
-
G. Han, L. Shu, J. Ma, J. Park, and J. Ni, "Power-aware and reliable sensor selection based on trust for wireless sensor networks," in Journal of Communications, vol. 5, no. 1, January 2010, pp. 23-30.
-
(2010)
Journal of Communications
, vol.5
, Issue.1
, pp. 23-30
-
-
Han, G.1
Shu, L.2
Ma, J.3
Park, J.4
Ni, J.5
-
74
-
-
80052042378
-
The new challenge: Mobile multimedia sensor networks
-
L. Shu, Y. Chen, T. Hara, M. Hauswirth, and S. Nishio, "The new challenge: Mobile multimedia sensor networks," in In Indersicence, International Journal of Multimedia Intelligence and Security, vol. 2, no. 2, 2011, pp. 107-119.
-
(2011)
Indersicence, International Journal of Multimedia Intelligence and Security
, vol.2
, Issue.2
, pp. 107-119
-
-
Shu, L.1
Chen, Y.2
Hara, T.3
Hauswirth, M.4
Nishio, S.5
|