메뉴 건너뛰기




Volumn 21, Issue 1, 2014, Pages 19-34

M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks

Author keywords

clustering; Multi jammer localization; skeletonization; wireless sensor networks

Indexed keywords

CLUSTERING; COMMUNICATION MECHANISMS; EXTENSIVE SIMULATIONS; LOCALIZATION ALGORITHM; LOCALIZATION PROBLEMS; MULTI-JAMMER LOCALIZATION; SKELETONIZATION; WIRELESS SENSOR NETWORK (WSNS);

EID: 84889839787     PISSN: 10692509     EISSN: 18758835     Source Type: Journal    
DOI: 10.3233/ICA-130445     Document Type: Article
Times cited : (33)

References (35)
  • 1
    • 33847396877 scopus 로고    scopus 로고
    • Skeleton pruning by contour partitioning with discrete curve evolution
    • X. Bai, L.J. Latecki and W.-Y. Liu, Skeleton pruning by contour partitioning with discrete curve evolution, in: IEEE Trans Pattern Anal Mach Intell (2007), 449-462.
    • (2007) IEEE Trans Pattern Anal Mach Intell , pp. 449-462
    • Bai, X.1    Latecki, L.J.2    Liu, W.-Y.3
  • 2
    • 77954553948 scopus 로고    scopus 로고
    • Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps
    • April
    • Z. Bankovíc, J.M. Moya, A. Araujo, D. Fraga, J.C. Vallejo and J.-M. de Goyeneche, Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps, Integr Comput- Aided Eng 17(2) (April 2010), 87-102.
    • (2010) Integr Comput- Aided Eng , vol.17 , Issue.2 , pp. 87-102
    • Bankovíc, Z.1    Moya, J.M.2    Araujo, A.3    Fraga, D.4    Vallejo, J.C.5    De Goyeneche, J.-M.6
  • 4
    • 0742322178 scopus 로고    scopus 로고
    • A linear-time componentlabeling algorithm using contour tracing technique
    • F. Chang, C.-J. Chen and C.-J. Lu, A linear-time componentlabeling algorithm using contour tracing technique, in: Computer Vision and Image Understanding (2004), 206-220.
    • (2004) Computer Vision and Image Understanding , pp. 206-220
    • Chang, F.1    Chen, C.-J.2    Lu, C.-J.3
  • 7
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • J.T. Chiang and Y.-C. Hu, Dynamic jamming mitigation for wireless broadcast networks, in: IEEE Infocom, (2008).
    • (2008) IEEE Infocom
    • Chiang, J.T.1    Hu, Y.-C.2
  • 11
    • 84863713821 scopus 로고    scopus 로고
    • Antenna selection in polarized multiple input multiple output transmissions with mutual coupling
    • A. Habib and M. Rupp, Antenna selection in polarized multiple input multiple output transmissions with mutual coupling, Integrated Computer-Aided Engineering (2012), 299-312.
    • (2012) Integrated Computer-Aided Engineering , pp. 299-312
    • Habib, A.1    Rupp, M.2
  • 13
    • 84860153991 scopus 로고    scopus 로고
    • Network management framework and lifetime evaluation method for wireless sensor networks
    • J. Kim, H. Jeon and J. Lee, Network management framework and lifetime evaluation method for wireless sensor networks, Integrated Computer-Aided Engineering (2012), 165-178.
    • (2012) Integrated Computer-Aided Engineering , pp. 165-178
    • Kim, J.1    Jeon, H.2    Lee, J.3
  • 19
    • 34247885928 scopus 로고    scopus 로고
    • Wireless sensor network localization techniques
    • G. Mao, B. Fidan and B.D.O. Anderson, Wireless sensor network localization techniques, in: Comput Netw 51 (2007), 2529-2553.
    • (2007) Comput Netw , vol.51 , pp. 2529-2553
    • Mao, G.1    Fidan, B.2    Anderson, B.D.O.3
  • 20
    • 77951710463 scopus 로고    scopus 로고
    • Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system
    • S. Misra, R. Singh and S.V.R. Mohan, Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system, in: Sensors 10 (2010), 3444-3479.
    • (2010) Sensors , vol.10 , pp. 3444-3479
    • Misra, S.1    Singh, R.2    Mohan, S.V.R.3
  • 21
    • 67749114527 scopus 로고    scopus 로고
    • An effective defensive node against jamming attacks in sensor networks
    • A. Mpitziopoulos and D. Gavalas, An effective defensive node against jamming attacks in sensor networks, in: Security and Communication Networks 2 (2009), 145-163.
    • (2009) Security and Communication Networks , vol.2 , pp. 145-163
    • Mpitziopoulos, A.1    Gavalas, D.2
  • 23
    • 0017453547 scopus 로고
    • Convex hulls of finite sets of points in two and three dimensions
    • F.P. Preparata and S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, in: Commun ACM (1977).
    • (1977) Commun ACM
    • Preparata, F.P.1    Hong, S.J.2
  • 25
    • 77956561765 scopus 로고    scopus 로고
    • Detection of reactive jamming in sensor networks
    • M. Strasser, B. Danev and S. Čapkun, Detection of reactive jamming in sensor networks, in: ACM Trans Sen Netw 7 (2010), 16:1-16:29.
    • (2010) ACM Trans Sen Netw , vol.7 , pp. 161-1629
    • Strasser, M.1    Danev, B.2    Čapkun, S.3
  • 32
    • 45749134626 scopus 로고    scopus 로고
    • Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks
    • A.D. Wood, J.A. Stankovic and G. Zhou, Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks, in: Proceedings of IEEE SECON'07 (2007).
    • (2007) Proceedings of IEEE SECON'07
    • Wood, A.D.1    Stankovic, J.A.2    Zhou, G.3
  • 34
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attacks and defense strategies
    • W. Xu, K. Ma, W. Trappe and Y. Zhang, Jamming sensor networks: Attacks and defense strategies, in: IEEE Network, (2006).
    • (2006) IEEE Network
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.