Login / Signup
On providing wormhole-attack-resistant localization using conflicting sets.
Honglong Chen
Wei Lou
Zhi Wang
Published in:
Wirel. Commun. Mob. Comput. (2015)
Keyphrases
</>
countermeasures
database
neural network
localization algorithm
artificial intelligence
position information
malicious attacks
power analysis