

Secure Probabilistic Location Verification for Wireless Sensor Networks
Abstract
Keywords
References
Yawen Wei, Student Member, IEEE, and Yong Guan, Member, IEEE, “Lightweight Location Verification Algorithms for Wireless Sensor Networks,” IEEE Trans.parallel and Distributed systems, vol. 24, no. 5,may 2013.
Jinfang Jiang, Guangjie Han1, Chuan Zhu1, Yuhui Dong and Na Zhang , “Secure Localization in Wireless Sensor Networks: A Survey,” JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 6, SEPTEMBER 2011
B. Karp and H. T. Kung, “GPSR: Greedy Perimeter Stateless Routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Network, 2000, pp. 243–354.
D. Liu and P. Ning, “Location-based pairwise key establishments for static sensor networks,” in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 72–82.
S. U. Sastry, N. and D. Wagner, “Secure verification of location claims,” in Proceedings of the 2nd ACM workshop on Wireless security, September 2003.
J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor networks: a survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, August 2008.
Ting ZHANG, Jingsha HE, Yang ZHANG, Yuqiang ZHANG and Xiaoyu SONG,” DV-based Robust Localization against Wormhole Attacks in Wireless Sensor Networks”, Journal of Computational Information Systems 7: 13 (2011) 4732-4739.
Manoop Talasila, Reza Curtmola, and Cristian Borcea,” LINK: Location verification through immediate Neighbors Knowledge,” Computer Science Department New Jersey Institute of Technology Newark, NJ, USA.
Tingting Sun, Bin Zan, Yanyong Zhang and Marco Gruteser, “The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks , “IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.