2018
DOI: 10.1016/j.adhoc.2018.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Secure localization using hypothesis testing in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In these types of applications, sensor nodes are distributed in a random scattering style through aerial vehicles or some other way at the desired location. However, in these types of applications, accurate knowledge of node location is extremely important to detect the source of sensed information and to take required actions based on this obtained sensed information [9]. 2023 Furthermore, it is highly essential to have knowledge of the source of data generation to analyze sensed data.…”
Section: Introductionmentioning
confidence: 99%
“…In these types of applications, sensor nodes are distributed in a random scattering style through aerial vehicles or some other way at the desired location. However, in these types of applications, accurate knowledge of node location is extremely important to detect the source of sensed information and to take required actions based on this obtained sensed information [9]. 2023 Furthermore, it is highly essential to have knowledge of the source of data generation to analyze sensed data.…”
Section: Introductionmentioning
confidence: 99%
“…In such cases, the locations of nodes will be unknown. But, location information of nodes is essential for these applications to identify the origins of sensed data and to act on them [8]. Attaching Global Positioning System (GPS) receivers with every node is not a possible option because of increased cost, power consumption, and lower accuracy due to shadowing effects.…”
Section: Introductionmentioning
confidence: 99%