Enhancing Security and Power Management in Wireless Sensor Networks
Abstract
Keywords
Full Text:
PDFReferences
S. Appadwedula, V.V. Veeravalli, and D.L. Jones, “Robust and Locally-Optimum Decentralized Detection with Censoring Sensors,” Proc. Fifth Int’l Conf. Information Fusion, pp. 56-63, July 2002.
N. Patwari, A.O. Hero, and B.M. Sadler, “Hierarchical Censoring Sensors for Change Detection,” Proc. IEEE Workshop Statistical Signal Processing, pp. 21-24, Sept. 2003.
N.Patwari and A.O. Hero, “Hierarchical Censoring for Distributed Detection in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing, pp. IV 848-IV-851, 2003.
P. Gross, J.T. Mangan, and K.L. Godrich, “Assuring Operational Continuity in C4ISR Facilities,” Proc. Industrial and Commercial Power Systems Technical Conf., pp. 1-8, Apr. 2006.
L. Lazos and R.Poovendran, “Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE JSAC, vol. 24, Feb. 2006, pp. 233– 46.
L. Lazos and R. Poovendran, “Serloc: Secure Range- Independent Localization for Wireless Sensor Networks,” Proc. WiSe ’04, 2004, pp. 21–30.
L. Lazos, R. Poovendran, and S. Capkun, “Rope: Robust Position Estimation in Wireless Sensor Networks,” Proc. IPSN, Apr. 200, pp. 324–31.
S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” INFOCOM ’05, Miami, FL, Mar.2005.
D. Liu, P. Ning, and W. Du, “Detecting Malicious BeaconNodes for Secure Location Discovery in Wireless Sensor Networks” 25th ICDCS, 2005, pp. 609–19.
A. Srinivasan, J. Teitelbaum, and J. Wu, “DRBTS: DistributedReputation-Based Beacon Trust System,”2nd IEEE DASC, 2006, pp. 277–83.
Z. Li et al., “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” IPSN ’05, 2005, p. 12.
D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” IPSN ’05: Proc. 4th Int’l. Symp. Info. Processing in Sensor Networks, 2005, p. 13.
W. Du, L. Fang, and P. Ning, “Lad: Localization Anomaly Detection for Wireless Sensor Networks,” 19th IPDPS, 2005, p. 41.1.
N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” WiSe ’03, N2003, pp. 1–10.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.