Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/6048
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Chen, H | - |
dc.creator | Lou, W | - |
dc.creator | Wang, Z | - |
dc.date.accessioned | 2014-12-11T08:24:47Z | - |
dc.date.available | 2014-12-11T08:24:47Z | - |
dc.identifier.issn | 1687-1472 | - |
dc.identifier.uri | http://hdl.handle.net/10397/6048 | - |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.rights | Copyright © 2010 Honglong Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | en_US |
dc.subject | Computer simulation | en_US |
dc.subject | Sensors | en_US |
dc.subject | ubiquitous computing | en_US |
dc.title | A novel secure localization approach in wireless sensor networks | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 12 | - |
dc.identifier.volume | 2010 | - |
dc.identifier.doi | 10.1155/2010/981280 | - |
dcterms.abstract | Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor networks under the nonadversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied performance under the adversarial scenario. In this paper, we propose three attack-resistant localization schemes, called basic TSCD, enhanced TSCD and mobility-aided TSCD secure localization schemes, respectively, to stand against the distance-consistent spoofing attack in wireless sensor networks. The idea behind the basic TSCD scheme is to adopt the temporal and spatial properties of locators to detect some attacked locators firstly and then utilize the consistent property of the detected attacked locators to identify other attacked locators. Enhanced TSCD and mobility-aided TSCD schemes are designed based on the basic TSCD scheme to improve the performance. Simulation results demonstrate that our proposed schemes outperform other existing approaches under the same network parameters. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | EURASIP journal on wireless communications and networking, 9 Nov. 2010, v. 2010, 981280, p. 1-12 | - |
dcterms.isPartOf | EURASIP journal on wireless communications and networking | - |
dcterms.issued | 2010-11-09 | - |
dc.identifier.isi | WOS:000286280000001 | - |
dc.identifier.scopus | 2-s2.0-79251604483 | - |
dc.identifier.eissn | 1687-1499 | - |
dc.identifier.rosgroupid | r54830 | - |
dc.description.ros | 2010-2011 > Academic research: refereed > Publication in refereed journal | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_IR/PIRA | en_US |
dc.description.pubStatus | Published | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Chen_Wireless_Sensor_Networks.pdf | 953.99 kB | Adobe PDF | View/Open |
Page views
120
Last Week
1
1
Last month
Citations as of Apr 21, 2024
Downloads
105
Citations as of Apr 21, 2024
SCOPUSTM
Citations
17
Last Week
0
0
Last month
0
0
Citations as of Apr 26, 2024
WEB OF SCIENCETM
Citations
9
Last Week
0
0
Last month
0
0
Citations as of Apr 25, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.