-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
10.1016/S1389-1286(01)00302-4
-
Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393-422
-
(2002)
Comput Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
33750303903
-
Secure localization in sensor networks using transmission range variation
-
Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: Proceedings of MASS
-
(2005)
Proceedings of MASS
-
-
Anjum, F.1
Pandey, S.2
Agrawal, P.3
-
5
-
-
42649116160
-
Secure localization algorithms for wireless sensor networks
-
10.1109/MCOM.2008.4481347
-
Boukerche A, Oliveira H, Nakamura E, Loureiro A (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96-101
-
(2008)
IEEE Commun Mag
, vol.46
, Issue.4
, pp. 96-101
-
-
Boukerche, A.1
Oliveira, H.2
Nakamura, E.3
Loureiro, A.4
-
7
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings of INFOCOM
-
(2005)
Proceedings of INFOCOM
-
-
Capkun, S.1
Hubaux, J.P.2
-
8
-
-
33144454801
-
Secure positioning in wireless networks
-
doi: 10.1109/JSAC.2005.861380
-
Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun. doi: 10.1109/JSAC.2005.861380
-
(2006)
IEEE J Sel Areas Commun.
-
-
Capkun, S.1
Hubaux, J.P.2
-
10
-
-
39749096536
-
Secure location verification with hidden and mobile base stations
-
10.1109/TMC.2007.70782
-
Capkun S, Rasmussen K, Cagalj M, Srivastava M (2008) Secure location verification with hidden and mobile base stations. IEEE Trans Mobile Comput 7(4):470-483
-
(2008)
IEEE Trans Mobile Comput
, vol.7
, Issue.4
, pp. 470-483
-
-
Capkun, S.1
Rasmussen, K.2
Cagalj, M.3
Srivastava, M.4
-
12
-
-
33746313270
-
LAD: Localization anomaly detection forwireless sensor networks
-
Du W, Fang L, Ning P (2005) LAD: Localization anomaly detection forwireless sensor networks. In: Proceedings of IPDPS
-
(2005)
Proceedings of IPDPS
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
13
-
-
42549116750
-
A probabilistic approach to location verification in wireless sensor networks
-
Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: Proceedings of ICC
-
(2006)
Proceedings of ICC
-
-
Ekici, E.1
McNair, J.2
Al-Abri, D.3
-
14
-
-
35548948372
-
Secure probabilistic location verification in randomly deployed wireless sensor networks
-
10.1016/j.adhoc.2006.11.006
-
Ekici E, Vural S, McNair J, Al-Abri D (2008) Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw 6(2):195-209
-
(2008)
Ad Hoc Netw
, vol.6
, Issue.2
, pp. 195-209
-
-
Ekici, E.1
Vural, S.2
McNair, J.3
Al-Abri, D.4
-
17
-
-
33751035788
-
Localization in sparse networks using sweeps
-
Goldenberg DK, Bihler P, Cao M, Fang J, Anderson BDO, Morse AS, Yang YR (2006) Localization in sparse networks using sweeps. In: Proceedings of MobiCom
-
(2006)
Proceedings of MobiCom
-
-
Goldenberg, D.K.1
Bihler, P.2
Cao, M.3
Fang, J.4
Bdo, A.5
Morse, A.S.6
Yang, Y.R.7
-
19
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
10.1109/TPDS.2008.166
-
He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050-1058
-
(2009)
IEEE Trans Parallel Distrib Syst
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
20
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Hu Y, Perrig A, Johnson D (2003) Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM
-
(2003)
Proceedings of INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
22
-
-
77953295176
-
Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization
-
Jian L, Yang Z, Liu Y (2010) Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization. In: Proceedings of INFOCOM
-
(2010)
Proceedings of INFOCOM
-
-
Jian, L.1
Yang, Z.2
Liu, Y.3
-
23
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of MobiCom
-
(2000)
Proceedings of MobiCom
-
-
Karp, B.1
Kung, H.T.2
-
25
-
-
70349169526
-
Anti-collusion position estimation in wireless sensor networks
-
Kiyavash N, Koushanfar F (2007) Anti-collusion position estimation in wireless sensor networks. In: Proceedings of MASS
-
(2007)
Proceedings of MASS
-
-
Kiyavash, N.1
Koushanfar, F.2
-
26
-
-
0141509888
-
Distributed localization in wireless sensor networks: A quantitative comparison
-
1069.68653 10.1016/S1389-1286(03)00356-6
-
Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Netw 43(4):499-518
-
(2003)
Comput Netw
, vol.43
, Issue.4
, pp. 499-518
-
-
Langendoen, K.1
Reijers, N.2
-
27
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of ACM WiSe
-
(2004)
Proceedings of ACM WiSe
-
-
Lazos, L.1
Poovendran, R.2
-
28
-
-
33144475948
-
HiRLoc: High-resolution robust localization for wireless sensor networks
-
10.1109/JSAC.2005.861381
-
Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233-246
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
30
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
10.1109/WC-M.2006.250353
-
Leinmuller T, Schoch E, Kargl F (2006) Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun 13(5):16-21
-
(2006)
IEEE Wirel Commun
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmuller, T.1
Schoch, E.2
Kargl, F.3
-
31
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of IPSN
-
(2005)
Proceedings of IPSN
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
32
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM SASN
-
(2003)
Proceedings of ACM SASN
-
-
Liu, D.1
Ning, P.2
-
33
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
Liu D, Ning P, Du W (2005) Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proceedings of ICDCS
-
(2005)
Proceedings of ICDCS
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
34
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
Liu D, Ning P, Du WK (2005) Attack-resistant location estimation in sensor networks. In: Proceedings of IPSN
-
(2005)
Proceedings of IPSN
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
35
-
-
49449086367
-
Attack-resistant location estimation in wireless sensor networks
-
1176.49013 10.1145/1380564.1380570
-
Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1-39
-
(2008)
ACM Trans Inf Syst Secur
, vol.11
, Issue.4
, pp. 1-39
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, C.4
Du, W.K.5
-
36
-
-
49149087835
-
Robust distributed node localization with error management
-
Liu J, Zhang Y, Zhao F (2006) Robust distributed node localization with error management. In: Proceedings of MobiHoc
-
(2006)
Proceedings of MobiHoc
-
-
Liu, J.1
Zhang, Y.2
Zhao, F.3
-
37
-
-
34247885928
-
Wireless sensor network localization techniques
-
1120.68021 10.1016/j.comnet.2006.11.018
-
Mao G, Fidan B, Anderson BDO (2007) Wireless sensor network localization techniques. Comput Netw 51(10):2529-2553
-
(2007)
Comput Netw
, vol.51
, Issue.10
, pp. 2529-2553
-
-
Mao, G.1
Fidan, B.2
Anderson, B.D.O.3
-
38
-
-
35148872660
-
ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment
-
Misra S, Bhardwaj S, Xue G (2006) ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment. In: Proceedings of MILCOM
-
(2006)
Proceedings of MILCOM
-
-
Misra, S.1
Bhardwaj, S.2
Xue, G.3
-
39
-
-
64049093544
-
Secure and robust localization in a wireless ad hoc environment
-
10.1109/TVT.2008.926616
-
Misra S, Xue G, Bhardwaj S (2009) Secure and robust localization in a wireless ad hoc environment. IEEE Trans Veh Technol 58(3):1480-1489
-
(2009)
IEEE Trans Veh Technol
, vol.58
, Issue.3
, pp. 1480-1489
-
-
Misra, S.1
Xue, G.2
Bhardwaj, S.3
-
45
-
-
85084163355
-
Robust positioning algorithms for distributed ad-hoc wireless sensor networks
-
Savarese C, Rabay J (2002) Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In: Proceedings of USENIX
-
(2002)
Proceedings of USENIX
-
-
Savarese, C.1
Rabay, J.2
-
47
-
-
0036983357
-
The bits and flops of the n-hop multilateration primitive for node localization problems
-
Savvides A, Park H, Srivastava MB (2002) The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of WSNA
-
(2002)
Proceedings of WSNA
-
-
Savvides, A.1
Park, H.2
Srivastava, M.B.3
-
50
-
-
57549096410
-
A survey on secure localization in wireless sensor networks
-
B. Furht (eds) CRC Press Boca Raton
-
Srinivasan A, Wu J (2008) A survey on secure localization in wireless sensor networks. In: Furht B (ed) Encyclopedia of wireless and mobile communications. CRC Press, Boca Raton
-
(2008)
Encyclopedia of Wireless and Mobile Communications
-
-
Srinivasan, A.1
Wu, J.2
-
51
-
-
70350741999
-
Distributed reputation-based secure localization in sensor networks
-
Srinivasan A, Wu J, Teitelbaum J (2007) Distributed reputation-based secure localization in sensor networks. J Auton Trusted Comput. http://www.cis.temple.edu/~wu/DRBTS-JournalVersion-JoATC.pdf
-
(2007)
J Auton Trusted Comput
-
-
Srinivasan, A.1
Wu, J.2
Teitelbaum, J.3
-
52
-
-
33751507355
-
Secure location verification using radio broadcast
-
10.1109/TDSC.2006.57
-
Vora A, Nesterenko M (2006) Secure location verification using radio broadcast. IEEE Trans Depend Secure Comput 3(4):377-385
-
(2006)
IEEE Trans Depend Secure Comput
, vol.3
, Issue.4
, pp. 377-385
-
-
Vora, A.1
Nesterenko, M.2
-
54
-
-
34249800081
-
Sensor localization under limited measurement capabilities
-
10.1109/MNET.2007.364254
-
Wang C, Xiao L (2007) Sensor localization under limited measurement capabilities. IEEE Netw 21(3):16-23
-
(2007)
IEEE Netw
, vol.21
, Issue.3
, pp. 16-23
-
-
Wang, C.1
Xiao, L.2
-
55
-
-
34848819422
-
Location verification algorithms for wireless sensor networks
-
Wei Y, Yu Z, Guan Y (2007) Location verification algorithms for wireless sensor networks. In: Proceedings of ICDCS
-
(2007)
Proceedings of ICDCS
-
-
Wei, Y.1
Yu, Z.2
Guan, Y.3
-
56
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc
-
(2005)
Proceedings of MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
57
-
-
48349098629
-
Secure hop-count based localization in wireless sensor networks
-
Zeng Y, Zhang S, Guo S, Li X (2007) Secure hop-count based localization in wireless sensor networks. In: Proceedings of CIS
-
(2007)
Proceedings of CIS
-
-
Zeng, Y.1
Zhang, S.2
Guo, S.3
Li, X.4
-
58
-
-
84886725134
-
Secure localization and location verification in wireless sensor networks
-
Zeng Y, Cao J, Hong J, Xie L (2009) Secure localization and location verification in wireless sensor networks. In: Proceedings of TSP
-
(2009)
Proceedings of TSP
-
-
Zeng, Y.1
Cao, J.2
Hong, J.3
Xie, L.4
-
59
-
-
84886722193
-
SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks
-
Zeng Y, Cao J, Hong J, Zhang S, Xie L (2009) SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks. In: Proceedings of WSNS
-
(2009)
Proceedings of WSNS
-
-
Zeng, Y.1
Cao, J.2
Hong, J.3
Zhang, S.4
Xie, L.5
-
60
-
-
70349177807
-
Pollution attack: A new attack against localization in wireless sensor networks
-
Zeng Y, Cao J, Zhang S, Guo S, Xie L (2009) Pollution attack: a new attack against localization in wireless sensor networks. In: Proceedings of WCNC
-
(2009)
Proceedings of WCNC
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
61
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
10.1109/JSAC.2005.863855
-
Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829-835
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
|