Author of the publication

Pollution attack: a new attack against localization in wireless sensor networks.

, , , , and . WCNC, page 2038-2043. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pollution attack: a new attack against localization in wireless sensor networks., , , , and . WCNC, page 2038-2043. IEEE, (2009)A Location-free Prediction-based Sleep Scheduling Protocol for Object Tracking in Sensor Networks., , , , , and . ICNP, page 63-72. IEEE Computer Society, (2009)Secure localization and location verification in wireless sensor networks., , , and . MASS, page 864-869. IEEE Computer Society, (2009)SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks., , , , and . MASS, page 1054-1059. IEEE Computer Society, (2009)On accuracy of region based localization algorithms for wireless sensor networks., , , , , and . Computer Communications, 33 (12): 1391-1403 (2010)Secure localization and location verification in wireless sensor networks: a survey., , , , and . The Journal of Supercomputing, 64 (3): 685-701 (2013)Deep Packet Inspection with Delayed Signature Matching in Network Auditing., and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 75-91. Springer, (2018)SWCA: a secure weighted clustering algorithm in wireless ad hoc networks., , , , and . WCNC, page 2426-2431. IEEE, (2009)Random-walk based approach to detect clone attacks in wireless sensor networks., , , , and . IEEE Journal on Selected Areas in Communications, 28 (5): 677-691 (2010)Secure Hop-Count Based Localization in Wireless Sensor Networks., , , and . CIS, page 907-911. IEEE Computer Society, (2007)