Author:
Hussein Ahmed Abdulqader,Leow Chee Yen,Rahman Tharek A.
Publisher
Public Library of Science (PLoS)
Reference55 articles.
1. Mao G. Localization Algorithms and Strategies for Wireless Sensor Networks: Monitoring and Surveillance Techniques for Target Tracking: Monitoring and Surveillance Techniques for Target Tracking. IGI Global; 2009.
2. A security and robustness performance analysis of localization algorithms to signal strength attacks;Y Chen;ACM Transactions on Sensor Networks (TOSN),2009
3. Detecting and localizing identity-based attacks in wireless and sensor networks;Y Chen;Vehicular Technology, IEEE Transactions on,2010
4. Principles of wireless sensor networks;M Obaidat,2014
5. Kumari S, Das AK, Wazid M, Li X, Wu F, Choo KKR, et al. On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience. 2016;.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献