×
These proposed schemes can tolerate up to 50% of beacon nodes being malicious, and they have linear computation time with respect to the number of reference ...
This paper proposes novel schemes for secure dynamic localization in sensor networks that can tolerate up to 50% of beacon nodes being malicious, ...
The proposed algorithms tolerate up to 50% of beacon nodes being malicious and they have linear computation time with respect to the number of reference nodes.
In this paper, we propose novel schemes for secure dynamic localization in sensor networks. The proposed algorithms tolerate up to 50% of beacon nodes being ...
This method tolerates malicious beacon signals by adopting an iteratively refined voting scheme. Both methods survive malicious attacks even if the attacks ...
Nov 1, 2023 · The malicious attack interrupts the normal functioning of the scheme by manipulating the routing information, computing the location and ...
In this paper, we propose novel schemes for secure dynamic localization in sensor networks. ... EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS ...
This experiment simulates the scenario with one malicious node in the network. We program node 0 to act maliciously by varying its transmit power once every 16 ...
The simulation results show that the proposed TSLS scheme can distinguish between trustworthy and malicious beacon nodes effectively, reduce the effect of ...
All the simulation results that we have obtained clearly show that RBL can reduce the effect of malicious beacon nodes on the localization of regular sensor ...