[1] AKYILDIZ F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks:a survey[J]. Computer Networks, 2002, 38(4):393-422. [2] CAPKUN S, HUBAUX J P. Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):221-232. [3] BOUKERCHE A, OLIVEIRA H A B, NAKAMURA E F, et al. Secure localization algorithms for wireless sensor networks[J]. IEEE Communications Magazine, 2008, 46(4):96-101. [4] GOYAL S, BHATIA T, VERMA A K. Wormhole and Sybil attack in WSN:a review[C]//Proceedings of the IEEE 2nd International Conference on Computing for Sustainable Global Development. Piscataway, NJ:IEEE, 2015:1463-1468. [5] KARLOF C, WAGNER D. Secure routing in wireless sensor networks:attacks and countermeasures[J]. Ad Hoc Networks, 2003, 1(3):293-315. [6] VAMSI P R, KANT K. A lightweight Sybil attack detection framework for wireless sensor networks[C]//Proceedings of the IEEE Seventh International Conference on Contemporary Computing. Piscataway, NJ:IEEE, 2014:387-393. [7] SARIGIANNIDIS P, KARAPISTOLI E, ECONOMIDES A A. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information[J]. Expert Systems with Applications, 2015, 42(21):7560-7572. [8] BULUSU N, HEIDEMANN J, ESTRIN D. GPS-less low cost outdoor localization for very small devices[J]. IEEE Personal Communications, 2000, 7(5):28-34. [9] YU Y, LI K, ZHOU W, et al. Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J]. Journal of Network and Computer Applications, 2012, 35(3):867-880. [10] LAZOS L, POOVENDRAN R. HiRLoc:high-resolution robust localization for wireless sensor networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):233-246. [11] 程海青, 王华, 王华奎. 无线传感器网络中检测女巫攻击的节点定位方法[J].电讯技术, 2011, 51(9):87-91.(CHENG H Q, WANG H, WANG H K. Detection of Sybil attack in localization mechanisms of wireless sensor networks[J]. Telecommunication Engineering, 2011, 51(9):87-91.) [12] ZHANG T, HE J, LI X, et al. A novel secure localization scheme for wireless sensor networks[J]. Journal of Convergence Information Technology, 2012, 7(5):10-16. [13] NICULESCU D, NATH B. DV based positioning in Ad Hoc networks[J]. Telecommunication Systems, 2003, 22 (1):267-280. [14] GUI L, VAL T, WEI A, et al. Improvement of range-free localization technology by a novel DV-hop protocol in wireless sensor networks[J]. Ad Hoc Networks, 2015, 24(2):55-73. [15] 夏少波, 邹建梅, 朱晓丽, 等. 无线传感器网络DV-Hop定位算法的改进[J]. 计算机应用, 2015, 35(2):340-344.(XIA S B, ZOU J M, ZHU X L, et al. Improvement on DV-Hop localization algorithm in wireless sensor networks[J]. Journal of Computer Applications, 2015, 35(2):340-344.) [16] 张佳, 吴延海, 石峰, 等. 基于DV-HOP的无线传感器网络定位算法[J]. 计算机应用, 2010, 30(2):323-326.(ZHANG J, WU Y H, SHI F, et al. Localization algorithm based on DV-HOP for wireless sensor networks[J]. Journal of Computer Applications, 2010, 30(2):323-326.) [17] CHEN H, LOU W, WANG Z, et al. Securing DV-Hop localization against wormhole attacks in wireless sensor networks[J]. Pervasive & Mobile Computing, 2014, 16(1):22-35. |