Asian Journal of Information Technology

Year: 2012
Volume: 11
Issue: 6
Page No. 285 - 292

Secure Authentication Technique for Localization in Wireless Sensor Networks

Authors : P.S. Velumani and S. Murugappan

References

Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
CrossRef  |  Direct Link  |  

Boyle, D. and T. Newe, 2008. Securing wireless sensor networks: Security architectures. J. Networks, 3: 65-77.

Chen, H., W. Lou and Z. Wang, 2009. Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing, July 7-9, 2009, Brisbane, Australia, pp: 296-309.

Chen, H., W. Lou and Z. Wang, 2010. Secure localization against wormhole attacks using conflicting sets. Proceedings of the IEEE 29th International Performance Computing and Communications Conference, December 9-11, 2010, Albuquerque, NM., USA., pp: 25-33.

Chen, H., W. Lou, J. Ma and Z. Wang, 2008. TSCD: A novel secure localization approach for wireless sensor networks. Proceedings of the 2nd International Conference on Sensor Technologies and Applications, August 25-31, 2008, Cap Esterel, France, pp: 661-666.

Hu, L. and D. Evans, 2004. Localization for mobile sensor networks. Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, September 26-October 1, 2004, Philadelphia, USA., pp: 45-57.

Kalita, H.K. and A. Kar, 2009. Wireless sensor network security analysis. Int. J. Next Gener. Networks, 1: 1-10.
Direct Link  |  

Karlof, C. and D. Wagner, 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1: 293-315.
CrossRef  |  Direct Link  |  

Kellner, A., O. Alfandi and D. Hogrefe, 2012. A Survey on measures for secure routing in wireless sensor networks. Int. J. Sensor Networks Data Communi., 1: 1-17.
CrossRef  |  Direct Link  |  

Langendoen, K. and N. Reijers, 2003. Distributed localization in wireless sensor networks: A quantitative comparison. Comput. Networks, 43: 499-518.
CrossRef  |  

Lewis, F.L., 2004. Wireless Sensor Networks. In: Smart Environments: Technologies, Protocols and Applications, Cook, D.J. and S.K. Das (Eds.). John Wiley, New York, ISBN-13: 9780471686583, pp: 13-44.

Liu, D., P. Ning, A. Liu, C. Wang and W.K. Du, 2008. Attack-resistant location estimation in wireless sensor networks. ACM Trans. Inf. Syst. Sec. (TISSEC), Vol. 11. 10.1145/1380564.1380570

Mao, G. and B. Fidan, 2009. Localization Algorithms and Strategies for Wireless Sensor Networks. Idea Group, USA Pages: 510.

Mi, Q., J.A. Stankovic and R. Stoleru, 2010. Secure walking GPS: A secure localization and key distribution scheme for wireless sensor networks. Proceedings of the 3rd ACM Conference on Wireless Network Security, March 22-24, 2010, Hoboken, NJ, USA., pp: 163-168.

Pal, A., 2010. Localization algorithms in wireless sensor networks: Current approaches and future challenges. Network Protocols Algorithms, 2: 45-73.
Direct Link  |  

Srinivasan, A. and J. Wu, 2007. A Survey on Secure Localization in Wireless Sensor Networks. In: Wireless and Mobile Communications, Furht, B. (Ed.). CRC Press, Boca Raton, London.

Stankovoic, J.A., 2006. Wireless sensor networks. University of Virginia, Charlottesville, VA., USA.

Velumani, P.S. and S. Murugappan, 2012. Ant based target tracking and localization technique for wireless sensor networks. Eur. J. Sci. Res., 70: 554-568.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved