Sciweavers

Share
WASA   2009 Systems and Applications Wireless Algorithms
Wall of Fame | Most Viewed WASA-2009 Paper
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
9 years 4 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source231
2Download preprint from source189
3Download preprint from source186
4Download preprint from source165
5Download preprint from source141
6Download preprint from source132
7Download preprint from source127
8Download preprint from source126
9Download preprint from source107
10Download preprint from source103
11Download preprint from source93
12Download preprint from source92
13Download preprint from source80
books