-
1
-
-
39749096536
-
Secure location verification with hidden and mobile base stations
-
April dio: 10.1109/TMC.2007.70782
-
S. Capkun, K.B. Rasmussen, M. Cagalj and M. Srivastava, "Secure location verification with hidden and mobile base stations," IEEE Transactions on Mobile Computing, vol. 7, April 2008, pp. 470-483, dio: 10.1109/TMC.2007.70782.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, pp. 470-483
-
-
Capkun, S.1
Rasmussen, K.B.2
Cagalj, M.3
Srivastava, M.4
-
2
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
IEEE Press, April doi: 10.1109/IPSN.2005.1440942
-
L. Lazos, P. Radha and S. Capkun, "ROPE: robust position estimation in wireless sensor networks," Proc. 4th International Symposium on Information Processing in Sensor Networks, IEEE Press, April 2005, pp. 324-331, doi: 10.1109/IPSN.2005.1440942.
-
(2005)
Proc. 4th International Symposium on Information Processing in Sensor Networks
, pp. 324-331
-
-
Lazos, L.1
Radha, P.2
Capkun, S.3
-
3
-
-
49449086367
-
Attack-resistant location estimation in wireless sensor networks
-
July doi: 10.1145/1380564.1380570
-
D. Liu, P. Ning, A. Liu, C. Wang and W.L. Du, "Attack-resistant location estimation in wireless sensor networks," ACM Transactions on Information and Systems Security, vol. 11, July 2008, pp. 22-39, doi: 10.1145/1380564.1380570.
-
(2008)
ACM Transactions on Information and Systems Security
, vol.11
, pp. 22-39
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, C.4
Du, W.L.5
-
4
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
ACM Press, September doi: 10.1145/1161289.1161297
-
Z. Li, W.Y. Xu, R. Miller and W. Trappe, "Securing wireless systems via lower layer enforcements," Proc. 5th ACM Workshop on Wireless Security, ACM Press, September 2006, pp.33-42, doi: 10.1145/1161289.1161297.
-
(2006)
Proc. 5th ACM Workshop on Wireless Security
, pp. 33-42
-
-
Li, Z.1
Xu, W.Y.2
Miller, R.3
Trappe, W.4
-
5
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
IEEE Press, June doi: 10.1109/ICDCS.2005.21
-
D. Liu, P. Ning and W.L. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," Proc. 25th IEEE International Conference on Distributed Computing Systems, IEEE Press, June 2005, pp. 609-619, doi: 10.1109/ICDCS.2005.21.
-
(2005)
Proc. 25th IEEE International Conference on Distributed Computing Systems
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.L.3
-
6
-
-
36949013183
-
DRBTS: Distributed reputation-based beacon trust system
-
IEEE Press. September doi: 10.1109/DASC.2006.28
-
A. Srinivasan, J. Teitelbaum and J. Wu, "DRBTS: distributed reputation-based beacon trust system," Proc. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, IEEE Press. September 2006, pp. 277-283, doi: 10.1109/DASC.2006.28.
-
(2006)
Proc. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
7
-
-
77955025560
-
A reputation-based revising scheme for localization in wireless sensor networks
-
IEEE Press, April doi: 10.1109/WCNC.2010.5506661
-
X.Y. Xu, H.Q. Jiang, L.S. Huang, H.L. Xu and M.J. Xiao, "A reputation-based revising scheme for localization in wireless sensor networks," Proc. 2010 IEEE Wireless Communications & Networking Conference, IEEE Press, April 2010, pp. 1-6, doi: 10.1109/WCNC.2010.5506661.
-
(2010)
Proc. 2010 IEEE Wireless Communications & Networking Conference
, pp. 1-6
-
-
Xu, X.Y.1
Jiang, H.Q.2
Huang, L.S.3
Xu, H.L.4
Xiao, M.J.5
-
8
-
-
72349096262
-
Reputation-enabled selfmodification for target sensing in wireless sensor networks
-
January doi: 10.1109/TIM.2009.2022445
-
X. Wang, L. Ding and D.W. Bi, "Reputation-enabled selfmodification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, January 2010, pp. 171-179, doi: 10.1109/TIM.2009.2022445.
-
(2010)
IEEE Transactions on Instrumentation and Measurement
, vol.59
, pp. 171-179
-
-
Wang, X.1
Ding, L.2
Bi, D.W.3
-
9
-
-
0041973656
-
Ad Hoc positioning system (APS) using AOA
-
IEEE Press, March doi: 10.1109/INFCOM.2003.1209196
-
D. Niculescu and B. Nath, "Ad Hoc positioning system (APS) using AOA," Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE Press, March 2003, pp. 1734-1743, doi: 10.1109/INFCOM.2003.1209196.
-
(2003)
Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1734-1743
-
-
Niculescu, D.1
Nath, B.2
-
10
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
IEEE Press, March doi:10.1109/INFCOM.2000.832252
-
P. Bahl and V.N. Padmanabhan, "RADAR: an in-building RF-based user location and tracking system," Proc. 19th Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE Press, March 2000, pp. 775-784, doi:10.1109/INFCOM.2000.832252.
-
(2000)
Proc. 19th Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
11
-
-
79952554222
-
Maximum likelihood estimation algorithm evaluation for wireless sensor networks
-
IEEE Press, September doi:10.1109/SYNASC.2010.51
-
R.I. Rusnac and A.S. Gontean, "Maximum likelihood estimation algorithm evaluation for wireless sensor networks," Proc. 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, IEEE Press, September 2010, pp. 95-98, doi:10.1109/SYNASC.2010.51.
-
(2010)
Proc. 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
, pp. 95-98
-
-
Rusnac, R.I.1
Gontean, A.S.2
|