Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …
other and generate a session key for the subsequent communications. With the rapid …
Location of mobile station with maneuvers using an IMM-based cubature Kalman filter
W Li, Y Jia - IEEE Transactions on Industrial Electronics, 2011 - ieeexplore.ieee.org
In this paper, we consider the problem of mobile location estimation in a rough wireless
environment. To mitigate the non-line-of-sight (NLOS) effects, the transition between the line …
environment. To mitigate the non-line-of-sight (NLOS) effects, the transition between the line …
Optimal information-theoretic wireless location verification
We develop a new location verification system (LVS) focused on network-based intelligent
transport systems (ITSs) and vehicular ad hoc networks (VANETs). The system that we …
transport systems (ITSs) and vehicular ad hoc networks (VANETs). The system that we …
Distance bounding: A practical security solution for real-time location systems
A Abu-Mahfouz, GP Hancke - IEEE transactions on industrial …, 2012 - ieeexplore.ieee.org
The need for implementing adequate security services in industrial applications is
increasing. Verifying the physical proximity or location of a device has become an important …
increasing. Verifying the physical proximity or location of a device has become an important …
TOA/RSS-Based Source Localization Using Probabilistic Model in Mixed LOS/NLOS Environments
MR Shamsian, F Behnia - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
When it comes to localization in urban or indoor environments, non-line of sight (NLOS)
propagations and the associated multipath effects cannot be avoided, a phenomenon which …
propagations and the associated multipath effects cannot be avoided, a phenomenon which …
Analysis of wireless localization in nonline-of-sight conditions
One major concern of existing wireless localization systems is the identification of nonline-of-
sight (NLOS) signal propagation, since NLOS can be considered the dominant source of …
sight (NLOS) signal propagation, since NLOS can be considered the dominant source of …
Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions
Location spoofing and non-line-of-sight (NLOS) propagation are two leading reasons of
serious localization errors in wireless networks. Previous studies have managed to identify …
serious localization errors in wireless networks. Previous studies have managed to identify …
Cooperative volunteer protocol to detect non-line of sight nodes in vehicular ad hoc networks
K Alodadi, AH Al-Bayatti, N Alalwan - Vehicular Communications, 2017 - Elsevier
A vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET)
application that impacts wireless communications and Intelligent Transport Systems (ITSs) …
application that impacts wireless communications and Intelligent Transport Systems (ITSs) …
Received signal strength-based location verification technique in Wireless Sensor Network using Spline curve
Location verification is crucial in many Wireless Sensor Networks (WSNs) applications. To
accurately identify a node's position, location verification is required, eliminating the …
accurately identify a node's position, location verification is required, eliminating the …
Collaborative localization and location verification in WSNs
C Miao, G Dai, K Ying, Q Chen - Sensors, 2015 - mdpi.com
Localization is one of the most important technologies in wireless sensor networks. A
lightweight distributed node localization scheme is proposed by considering the limited …
lightweight distributed node localization scheme is proposed by considering the limited …