SWOT : Secure Wireless Object Tracking with Key Renewal Mechanism for Indoor Wireless Sensor Network
Abstract
Keywords
Full Text:
PDFReferences
Long Cheng, et. all, “A Survey Localization in Wireless Sensor Network”, Hindawi Publishing Corporation International Journal of Distibuted Sensor Netwok, vol. 2012, 12 pages, 16 November 2012.
Peng Li, et. all, “Research on Secure Localization Model Bsed on Trust Valuation in Wireless Sensor Networks”, Hindawi Publishing Coorporation, Security and Communication Networks, vol. 2017, 12 pages, 8 March 2017.
Alessandro G., and Stefano Q., “Moving Object Detection in Heterogeneous Conditions in Embedded Systems”, Sensors 2017, vol.17, Issue 7, 1 July 2017
Jingsha He, et. All, “ Reputation-Based Secure Sensor Localization in Wireless Sensor Networks”, Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 10 pages, 20 May 2014.
Rafina D., Prima K., Amang S. “Cluster-Based PLE Areas for Mobile Cooperative Localization in Indoor Wireless Sensor Network”, International Conference on Information Technology and Electrical Engineering (ICITEE), pp: 112-117, October 2016, IEEE.
Rafina D., Prima K., Amang S., “Modified Iterated Extended Kalman Filter for Mobile Cooperative Tracking System”, International Journal on Advanced Science Engineering Information Technology, vol.7, no. 3, pp. 980-992, 2017.
Rafiullah Khan, Sarmad Ullah Khan Shahid Khan, and M. Usman Ali Khan, “Localization Performance Evaluation of Extended Kalman Filter in Wireless Sensors Network”, ANT international conference Procedia computer science, pp:117-124, 2014.
Shrikant P. D., Archana R. R., “Analysis of Location Monitoring Techniques with Privacy Preservation in WSN”, 4th International Conference on Communication Systems and Network Technology, pp: 649-653, 29 May 2014, IEEE.
Abhishek Das, Laxmipriya M., “Bypassing Using Directional Tranceivers: A Design for Anti-Tracking Source Location Privacy Protection in WSNs”, International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp: 39-44, 16 January 2016, IEEE
Gulshan K., Mritunjay K.R., Hye-Jin Kim, and Rahul S., “A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks”, Hindawi Publishing Coorporation, Mobile Information Systems, vol.2017, 12 pages, 26 February 2017.
Gonzalo S., Cristian G. G., and B. Cristina P. G., “Midgar: Study of Communications Security Among Smart Objects using Platform of Heteregeneous Devices for the Internet of Things”, Future Generation Computer Systems, vol. 74, issue 2017, pp: 444-466, Elsevier.
Yiqin Lu, Jing Zhai, R. Zhu, and Jiancheng Qin, “Study of Wireless Authentication Center With Mied Encryption in WSN”, Hindawi Publishing Corporation, Journal of Sensors, vol. 2016, 7 pages, 29 May 2016.
Singoee S. S., “Raspberry Pi Based Security System”, University of Nairobi, Department of Electrical and Information Engineering, 17 May 2016.
Rafina D., Prima K., Amang S. “Secure Data Transmission Scheme for Indoor Cooperative Localization System”, International Electronics Symposium (IES), September 2017, IEEE.
Saewoom Lee, and Kiseon Kim, “Key renewal mechanism with Sensor Authentication under Clustered Wireless Sensor Networks”, Electronics letters, vol. 51, No. 4, pp: 368-369, 19 February 2015, IEEE
R. J. Kavitha, B. Elizabeth C., “ Secured and Realiable Data Transmission on Multi-hop Wireless Sensor Network”, Springer science+Business Media, LLC 2017, 25 September 2017
M. Thangavel, P. Varalakshmi, S.Sridar, “ An Analysis of Privacy Preservation Schemes in Cloud Computing”, International Conference on Engineering and Technology (ICETECH), pp: 146-151, March 2016, IEEE
Lei Wang and Qing Wang, “Secure-Network-Coding-Bsed File Sharing Via Device-to-Device Communication”, Hindawi Publishing Coorporation, Journal of Electrical and Computer Engineering, vol. 2017, 7 pages, 8 June 2017.
Eddy P. N., Rizky R. J. P., and Iman M. R., “SMS Authentication Code Generated by Advanced Encryption Standard (AES) 256 bits Modification Algorithm and One Time Password (OTP) to Activate New Applicant Account”, ICSITECH, 2016, IEEE.
Salem Aljareh, and Anastasios Kavoukis, “Efficient Time Synchronized One-Time Password Scheme To Provide Secure Wake-Up Authentication on Wireless Sensor Netwoks”, International Journal of Advanced Smart Sensor Network Sytems (IJASSN), vol.3, No.1, January 2013.
Mostafa Abedi, M. Hassan Y., Farshad P., “ Fast Location Prediction Algorithm Utilized in Enchancing One Time Password Authentication”, IEEE Student Conference on Research and Development, 2012.
Zhang Yu, “The Scheme of Public Key Infrastucture for Improving Wireless Sensor Network Security”, International Conference on Computer Science and Automation, pp: 527-530, 2012, IEEE.
Amang S., Toru N., “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, Journal of Information Processing, vol.25, pp:234-243, February 2017.
Gaochang Z., Xiaolin Y., Bin Z., Wei W., “RSA-Based Digital Image Encryption Algorithm In Wireless Sensor Network”, ICSPS, pp: 640-643, 2010, IEEE.
DOI: http://dx.doi.org/10.18517/ijaseit.8.2.5268
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development