An UWB ranging-based localization strategy with internal attack immunity

Y Wang, X Ma, G Leus - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

An UWB ranging-based localization strategy with internal attack immunity

Y Wang, X Ma, G Leus - IEEE International Conference on Ultra …, 2010 - research.tudelft.nl
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

[PDF][PDF] An UWB Ranging-based Localization Strategy with Internal Attack Immunity

Y Wang, X Ma, G Leus - Citeseer
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

An UWB ranging-based localization strategy with internal attack immunity

Y Wang, X Ma, G Leus - 2010 IEEE International Conference on Ultra … - infona.pl
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

[PDF][PDF] An UWB Ranging-based Localization Strategy with Internal Attack Immunity

Y Wang, X Ma, G Leus - isea.sjtu.edu.cn
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

[PDF][PDF] An UWB Ranging-based Localization Strategy with Internal Attack Immunity

Y Wang, X Ma, G Leus - sps.ewi.tudelft.nl
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

[PDF][PDF] An UWB Ranging-based Localization Strategy with Internal Attack Immunity

Y Wang, X Ma, G Leus - scholar.archive.org
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

[PDF][PDF] An UWB Ranging-based Localization Strategy with Internal Attack Immunity

Y Wang, X Ma, G Leus - sps.ewi.tudelft.nl
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …