메뉴 건너뛰기




Volumn , Issue , 2011, Pages 55-58

Trust based secure localization in wireless sensor networks

Author keywords

localization; security; trust; wireless sensor

Indexed keywords

BEACON NODES; HOSTILE ENVIRONMENTS; INTERNAL NODES; LOCALIZATION; POSITION INFORMATION; SECURE LOCALIZATION; SECURITY; SECURITY ISSUES; TRUST; TRUST EVALUATION; WIRELESS SENSOR;

EID: 84862959443     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPTC.2011.21     Document Type: Conference Paper
Times cited : (8)

References (11)
  • 1
    • 39749096536 scopus 로고    scopus 로고
    • Secure location verification with hidden and mobile base stations
    • April dio: 10.1109/TMC.2007.70782
    • S. Capkun, K.B. Rasmussen, M. Cagalj and M. Srivastava, "Secure location verification with hidden and mobile base stations," IEEE Transactions on Mobile Computing, vol. 7, April 2008, pp. 470-483, dio: 10.1109/TMC.2007.70782.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , pp. 470-483
    • Capkun, S.1    Rasmussen, K.B.2    Cagalj, M.3    Srivastava, M.4
  • 3
    • 49449086367 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • July doi: 10.1145/1380564.1380570
    • D. Liu, P. Ning, A. Liu, C. Wang and W.L. Du, "Attack-resistant location estimation in wireless sensor networks," ACM Transactions on Information and Systems Security, vol. 11, July 2008, pp. 22-39, doi: 10.1145/1380564.1380570.
    • (2008) ACM Transactions on Information and Systems Security , vol.11 , pp. 22-39
    • Liu, D.1    Ning, P.2    Liu, A.3    Wang, C.4    Du, W.L.5
  • 4
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • ACM Press, September doi: 10.1145/1161289.1161297
    • Z. Li, W.Y. Xu, R. Miller and W. Trappe, "Securing wireless systems via lower layer enforcements," Proc. 5th ACM Workshop on Wireless Security, ACM Press, September 2006, pp.33-42, doi: 10.1145/1161289.1161297.
    • (2006) Proc. 5th ACM Workshop on Wireless Security , pp. 33-42
    • Li, Z.1    Xu, W.Y.2    Miller, R.3    Trappe, W.4
  • 5
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • IEEE Press, June doi: 10.1109/ICDCS.2005.21
    • D. Liu, P. Ning and W.L. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," Proc. 25th IEEE International Conference on Distributed Computing Systems, IEEE Press, June 2005, pp. 609-619, doi: 10.1109/ICDCS.2005.21.
    • (2005) Proc. 25th IEEE International Conference on Distributed Computing Systems , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.L.3
  • 8
    • 72349096262 scopus 로고    scopus 로고
    • Reputation-enabled selfmodification for target sensing in wireless sensor networks
    • January doi: 10.1109/TIM.2009.2022445
    • X. Wang, L. Ding and D.W. Bi, "Reputation-enabled selfmodification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, January 2010, pp. 171-179, doi: 10.1109/TIM.2009.2022445.
    • (2010) IEEE Transactions on Instrumentation and Measurement , vol.59 , pp. 171-179
    • Wang, X.1    Ding, L.2    Bi, D.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.