Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

The hardness of approximate optima in lattices, codes, and systems of linear equations

S Arora, L Babai, J Stern, Z Sweedyk - Journal of Computer and System …, 1997 - Elsevier
We prove the following about the Nearest Lattice Vector Problem (in anylpnorm), the
Nearest Codeword Problem for binary codes, the problem of learning a halfspace in the …

Precise indoor localization using smart phones

E Martin, O Vinyals, G Friedland, R Bajcsy - Proceedings of the 18th …, 2010 - dl.acm.org
We present an indoor localization application leveraging the sensing capabilities of current
state of the art smart phones. To the best of our knowledge, our application is the first one to …

Joint time synchronization and localization of an unknown node in wireless sensor networks

J Zheng, YC Wu - IEEE Transactions on Signal Processing, 2009 - ieeexplore.ieee.org
Time synchronization and localization are two important issues in wireless sensor networks.
Although these two problems share many aspects in common, they are traditionally treated …

Blockchain-based secure time protection scheme in IoT

K Fan, S Wang, Y Ren, K Yang, Z Yan… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) has been developed rapidly to make our life easier. In many IoT
applications (eg, smart homes, healthcare, etc.), all the IoT devices should be synchronized …

Wireless sensor networks for military purposes

M Winkler, M Street, KD Tuchs, K Wrona - Autonomous sensor networks …, 2013 - Springer
By connecting multiple sensors, data analysis services and applications, military capabilities
can be increased significantly. Consequently, wireless sensor networking has become a …

Secure localization algorithms against localization attacks in wireless sensor networks

TN Nguyen, VV Le, SI Chu, BH Liu, YC Hsu - Wireless Personal …, 2022 - Springer
The accuracy of the location estimation of sensors in wireless sensor networks (WSNs) is
important to many applications such as environment surveillance applications. In large-scale …

[HTML][HTML] Lessons from the congested clique applied to mapreduce

JW Hegeman, SV Pemmaraju - Theoretical Computer Science, 2015 - Elsevier
The main result of this paper is a simulation algorithm which, under quite general
constraints, transforms algorithms running in the Congested Clique model into algorithms …

Animal situation tracking service using RFID, GPS, and sensors

SH Kim, DH Kim, HD Park - 2010 Second International …, 2010 - ieeexplore.ieee.org
With the technology of sensor, RFID, and GPS, many researches are recently being carried
out on monitoring animal behavior and interactions with the environment. Plus, the …

Accurate distributed range-based positioning algorithm for wireless sensor networks

FKW Chan, HC So - IEEE Transactions on Signal Processing, 2009 - ieeexplore.ieee.org
Localization of sensor nodes is a fundamental and important problem in wireless sensor
networks. In this correspondence, a recursive distributed positioning algorithm is devised …