Smart home communication technologies and applications: Wireless protocol assessment for home area network resources

TDP Mendes, R Godina, EMG Rodrigues, JCO Matias… - Energies, 2015 - mdpi.com
The paper discusses Home Area Networks (HAN) communication technologies for smart
home and domestic application integration. The work is initiated by identifying the …

Veriplace: a privacy-aware location proof architecture

W Luo, U Hengartner - … of the 18th SIGSPATIAL International Conference …, 2010 - dl.acm.org
Recently, there has been a dramatic increase in the number of location-based services, with
services like Foursquare or Yelp having hundreds of thousands of users. A user's location is …

Secure localization and location verification in wireless sensor networks: a survey

Y Zeng, J Cao, J Hong, S Zhang, L Xie - the Journal of Supercomputing, 2013 - Springer
The locations of sensor nodes are very important to many wireless sensor networks (WSNs).
When WSNs are deployed in hostile environments, two issues about sensors' locations …

RSS-based localization in the presence of malicious nodes in sensor networks

B Mukhopadhyay, S Srirangarajan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The ability of a sensor node to determine its location in a sensor network is important in
many applications. We address the scenario, where malicious anchor node (s) attempt to …

[PDF][PDF] Secure localization in wireless sensor networks: a survey

J Jiang, G Han, C Zhu, Y Dong, N Zhang - J. Commun., 2011 - researchgate.net
Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important
research subject. When WSNs are deployed in hostile environments, many attacks happen …

Design of a time and location based One-Time Password authentication scheme

WB Hsieh, JS Leu - 2011 7th international wireless …, 2011 - ieeexplore.ieee.org
As the mobile networks are springing up, mobile devices become a must gadget in our daily
life. People can easily access Internet application services anytime and anywhere via the …

Where have you been? secure location provenance for mobile devices

R Hasan, R Burns - arXiv preprint arXiv:1107.1821, 2011 - arxiv.org
With the advent of mobile computing, location-based services have recently gained
popularity. Many applications use the location provenance of users, ie, the chronological …

Indoor positioning method, apparatus and system

APT Kainulainen, KHJ Kalliola, VV Ranki… - US Patent …, 2015 - Google Patents
EP 1329737 A2* 7/2003 EP 1731919. A 12/2006 EP 1786143 5/2007 EP 2 110965 A2 10,
2009 JP 2007-139521 A 6, 2007 JP 2011-089.947 A 5, 2011 WO WO 2004/059251 A1 T …

Method, apparatus, and computer program product for secure distance bounding based on direction measurement

KJ Kalliola, VV Ranki, APT Kainulainen… - US Patent …, 2016 - Google Patents
H0474/02(2009.01) Method, apparatus, and computer program product example
H04764/00(2009.01) embodiments provide secure distance estimation based on …

Validating presence of a communication device using a wireless local area network

R Sinha, R Balla - US Patent 9,198,034, 2015 - Google Patents
(57) ABSTRACT A method and system for validating presence of a communi cation device in
a confined area using a wireless local area network (WLAN) includes sending a first …