Citation: | DENG Ping, ZHANG Hongjiang. A DV-HOP Localization Algorithm Against Wormhole Attacks in WSN[J]. Journal of Southwest Jiaotong University, 2015, 28(1): 51-57,65. doi: 10.3969/j.issn.0258-2724.2015.01.008 |
邓平,伍小梅. 一种基于粒子滤波的WSN自适应定位算法
|
[J]. 西南交通大学学报,2014,49(2): 323-329. DENG Ping, WU Xiaomei. An adaptive localization algorithm based on particle filter in WSN
|
[J]. Journal of Southwest Jiaotong University, 2014, 49(2): 323-329.
|
彭宇,王丹. 无线传感器网络定位技术综述
|
[J]. 电子测量与仪器学,2011,25(5): 389-399. PENG Yu, WANG Dan. A review: wireless sensor networks localization
|
[J]. Journal of Electronic Measurement and Instrument, 2011, 25(5): 389-399.
|
陈鸿龙,李鸿斌,王智. 基于 TDoA测距的传感器网络安全定位研究
|
[J]. 通信学报,2008,29(8): 11-21. CHEN Honglong, LI Hongbin, WANG Zhi. Research on TDoA-based secure localization for wireless sensor networks
|
[J]. Journal on Communications, 2008, 29(8): 11-21.
|
HUANG Wenhao, WANG Yu, GUAN Haoran. The current situation and prospect of localization in wireless sensor networks
|
[J]. Computer Science and Engineering, 2009, 1: 483-487.
|
GARCA-OTERO M, POBLACIN A, FERNANDEZ-HERRERO A, et al. Performance of robust algorithms for secure localization in wireless sensor networks
|
[C]//Proc. of International Conference on Localization and GNSS (ICL-GNSS). Starnberg: IEEE, 2012: 1-4.
|
SUO Hui, WAN Jiafu, HUANG Lian, et al. Issues and challenges of wireless sensor networks localization in emerging applications
|
[C]//International Conference on Computer Science and Electronics Engineering. Hangzhou:
|
[s. n.], 2012: 447-451.
|
WANG Dexin, YANG Liuqing. Cooperative robust localization against malicious anchors based on semi-definite programming
|
[C]//Military Communications Conference. Orlando:
|
[s. n.], 2012: 1-6.
|
MOFARREH-BONAB M, GHORASHI S A. A low complexity and high speed gradient descent based secure localization in wireless sensor networks
|
[C]//International Conference on Computer and Knowledge Engineering. Mashhad:
|
[s. n.], 2013: 300-303.
|
PATEL M M, AGGARWAL A. Security attacks in wireless sensor networks: a survey
|
[C]//Intelligent Systems and Signal Processing (ISSP). Gujarat:
|
[s. n.], 2013: 329-333.
|
ABDELKARIM A, BENSLIMANE A, MABROUKI I, et al.SecAT-Dist a novel secure AT-Dist localization scheme for wireless sensor networks
|
[C]//Vehicular Technology Conference (VTC Fall). Quebec City:
|
[s. n.], 2012: 1-5.
|
NICULESCUS D, NATH B. DV based position in ad-hoc networks
|
[J]. Telecommunication Systems, 2003, 22(4): 267-280.
|
LAZOS L, POOVENDRAN R. SeRLoc: robust localization for wireless sensor networks
|
[J]. ACM Transactions on Sensor Networks, 2005, 1(1): 73-100.
|
LAZOS L, POOVENDRAN R. HiRLoc: high-resolution robust localization for wireless sensor networks
|
[J]. IEEE Journal on Selected Areas in Communications, 2006, 24: 233-246.
|
CHEN Honglong, LOU Wei, WANG Zhi. Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
|
[C]//Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing. Brisbane:
|
[s. n.], 2009: 296-309.
|
CHEN Honglong, LOU Wei, SUN Xice, et al. A consistency-based secure localization scheme against wormhole attacks in WSNs
|
[C]//Proc. of the International Conference on Wireless Algorithms, Systems and Applications. Albuquerque:
|
[s. n.], 2009: 368-377.
|
WU Junfeng, CHEN Honglong, LOU Wei, et al. Label-based DV-Hop localization against wormhole attacks in wireless sensor networks
|
[C]//Proc. of the 5th IEEE International Conference on Networking, Architecture, Storage. Macau: IEEE, 2010: 79-88.
|
HAYAJNEH T, KRISHNAMURTHY P, TIPPER D. DeWorm: a simple protocol to detect wormhole attacks in wireless ad hoc networks
|
[C]//Proc. of the 3rd International Conference on Network and System Security. Gold Coast:
|
[s. n.], 2009: 73-80.
|