Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model

Q **e, DS Wong, G Wang, X Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …

Location of mobile station with maneuvers using an IMM-based cubature Kalman filter

W Li, Y Jia - IEEE Transactions on Industrial Electronics, 2011 - ieeexplore.ieee.org
In this paper, we consider the problem of mobile location estimation in a rough wireless
environment. To mitigate the non-line-of-sight (NLOS) effects, the transition between the line …

Optimal information-theoretic wireless location verification

S Yan, R Malaney, I Nevat… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We develop a new location verification system (LVS) focused on network-based intelligent
transport systems (ITSs) and vehicular ad hoc networks (VANETs). The system that we …

Distance bounding: A practical security solution for real-time location systems

A Abu-Mahfouz, GP Hancke - IEEE transactions on industrial …, 2012 - ieeexplore.ieee.org
The need for implementing adequate security services in industrial applications is
increasing. Verifying the physical proximity or location of a device has become an important …

TOA/RSS-Based Source Localization Using Probabilistic Model in Mixed LOS/NLOS Environments

MR Shamsian, F Behnia - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
When it comes to localization in urban or indoor environments, non-line of sight (NLOS)
propagations and the associated multipath effects cannot be avoided, a phenomenon which …

Analysis of wireless localization in nonline-of-sight conditions

D Liu, MC Lee, CM Pun, H Liu - IEEE transactions on vehicular …, 2013 - ieeexplore.ieee.org
One major concern of existing wireless localization systems is the identification of nonline-of-
sight (NLOS) signal propagation, since NLOS can be considered the dominant source of …

Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions

D Liu, Y Xu, X Huang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
Location spoofing and non-line-of-sight (NLOS) propagation are two leading reasons of
serious localization errors in wireless networks. Previous studies have managed to identify …

Cooperative volunteer protocol to detect non-line of sight nodes in vehicular ad hoc networks

K Alodadi, AH Al-Bayatti, N Alalwan - Vehicular Communications, 2017 - Elsevier
A vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET)
application that impacts wireless communications and Intelligent Transport Systems (ITSs) …

Received signal strength-based location verification technique in Wireless Sensor Network using Spline curve

A Paul, S Sinha - The Journal of Supercomputing, 2023 - Springer
Location verification is crucial in many Wireless Sensor Networks (WSNs) applications. To
accurately identify a node's position, location verification is required, eliminating the …

Collaborative localization and location verification in WSNs

C Miao, G Dai, K Ying, Q Chen - Sensors, 2015 - mdpi.com
Localization is one of the most important technologies in wireless sensor networks. A
lightweight distributed node localization scheme is proposed by considering the limited …