A new intrusion detection system based on KNN classification algorithm in wireless sensor network

W Li, P Yi, Y Wu, L Pan, J Li - Journal of Electrical and …, 2014 - Wiley Online Library
The Internet of Things has broad application in military field, commerce, environmental
monitoring, and many other fields. However, the open nature of the information media and …

Secure localization and location verification in wireless sensor networks: a survey

Y Zeng, J Cao, J Hong, S Zhang, L **e - the Journal of Supercomputing, 2013 - Springer
The locations of sensor nodes are very important to many wireless sensor networks (WSNs).
When WSNs are deployed in hostile environments, two issues about sensors' locations …

Localised information fusion techniques for location discovery in wireless sensor networks

AM Abu-Mahfouz, GP Hancke - International Journal of …, 2018 - inderscienceonline.com
Many wireless sensor network (WSN) applications and techniques require sensor location to
work correctly. Information fusion in WSNs is crucial for location discovery and many …

An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks

R Garg, AL Varna, M Wu - IEEE transactions on information …, 2012 - ieeexplore.ieee.org
Many applications of wireless sensor networks require precise knowledge of the locations of
constituent nodes. In these applications, it is desirable for the nodes to be able to …

Discovery and verification of neighbor positions in mobile ad hoc networks

M Fiore, CE Casetti, CF Chiasserini… - … on mobile computing, 2011 - ieeexplore.ieee.org
A growing number of ad hoc networking protocols and location-aware services require that
mobile nodes learn the position of their neighbors. However, such a process can be easily …

Predicting the position of adjacent nodes with QoS in mobile ad hoc networks

CC Vignesh, S Karthik - Multimedia Tools and Applications, 2020 - Springer
Abstract The Mobile Ad Hoc Networks are a self-regulatory set of autonomous nodes which
perform communication to all the other nodes within their communication ranges. The nodes …

[PDF][PDF] Secure localization in wireless sensor networks: a survey

J Jiang, G Han, C Zhu, Y Dong, N Zhang - J. Commun., 2011 - researchgate.net
Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important
research subject. When WSNs are deployed in hostile environments, many attacks happen …

Analysis of security threats and vulnerability for cyber-physical systems

Y Gao, Y Peng, F **e, W Zhao, D Wang… - Proceedings of 2013 …, 2013 - ieeexplore.ieee.org
Governments, enterprises and research institutions have participated the research and
development of cyber-physical systems (CPS). However, the development of cyber-physical …

Secure distance-based localization in the presence of cheating beacon nodes

M Jadliwala, S Zhong, SJ Upadhyaya… - … on mobile computing, 2010 - ieeexplore.ieee.org
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is
an important problem in mobile wireless ad hoc and sensor networks. Despite significant …

Evaluating ALWadHA for providing secure localisation for wireless sensor networks

AM Abu-Mahfouz, GP Hancke - 2013 Africon, 2013 - ieeexplore.ieee.org
Most of the proposed localisation algorithms studied the problem of location discovery in a
non-adversarial environment. Although these types of algorithm are vulnerable to several …