[1] P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A
probabilistic room location service for wireless
networked environments,” in Proc. 3rd Int. Conf. Atlanta
Ubiquitous Computing (Ubicomp), vol. 2201, Sep.
2001,pp. 18–34.
[2] H. Chan, A. Perrig, and D. Song, “Random key
predistribution schemes for sensor networks,” in Proc.
IEEE Symp. Res. Security and Privacy, May 2003, p.
197.
[3] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki,
“Enhancing wireless location privacy using silent period,”
in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp.
1187–1192.
[4] Y.-C. Hu and H. J. Wang, “Location privacy in wireless
networks,” in Proc. ACM SIGCOMM Asia Workshop,
2005.
[5] L. Huang, K. Matsuura, H. Yamane, and K.
Sezaki.Enhancing Wireless Location Privacy Using Silent
Period. In Proceedings of the IEEE Wireless
Communications and Networking Conference(WCNC),
2005.
[6] L. Lazos and R. Poovendran. SeRLoc: Secure Range-
Independent Localization for Wireless Sensor Networks.
In Proceedings of the ACM Workshop on Wireless
Security (WiSe), 2004.
[7] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust
Statistical Methods for Securing Wireless Localization in
Sensor Networks. In Proceedings of the International
Conference on Information Processing in Sensor
Networks (IPSN), 2005.
[8] M. Gruteser and D. Grunwald. Enhancing location
privacy in wireless LAN through disposable interface
identifiers: a quantitative analysis. In Proceedings of
WMASH, 2003.
[9] Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng
Zhou. Tinysersync: Secure and resilient time
synchronization in wireless sensor networks. In
Proceedings of the ACM Conference on Computer and
Communications Security, 2006.
[10] Kun Sun, Peng Ning, and Cliff Wang;. Secure and
resilient clock synchronization in wireless sensor
networks. IEEE Journal on Selected Areas in
Communications, 24(2):395–408, 2006.
[11] M. Cagalj, S. Capkun, RamKumar Rengaswamy,Ilias
Tsigkogiannis, M. Srivastava, and Jean-Pierre Hubaux.
Integrity (I) codes: message Integrity Protection and
Authentication Over Insecure Channels. In Proceedings
of the IEEE Symposium on Research in Security and
Privacy, Oakland, California, USA, 2006.
[12] S. ?Capkun, L. Butty´an, and J.-P. Hubaux. SECTOR:
Secure Tracking of Node Encounters in Multi-hop
Wireless Networks. In Proceedings of the ACM
workshop on Security of Ad Hoc and Sensor Networks
(SASN), Washington, USA, October 2003.
[13] Y.C. Hu and H. J. Wang. Location Privacy in Wireless
Networks. In Proceedings of the ACM SIGCOMM Asia
Workshop, 2005.
[14] S. ?Capkun and J.-P. Hubaux. Secure positioning of
wireless devices with application to sensor networks. In
Proceedings of the IEEE Conference on Computer
Communications (InfoCom), 2005.
[15] M. Sichitiu and C. Veerarittiphan. Simple, accurate time
synchronization for wireless sensor networks. In
Proceedings of the IEEE Wireless Communications and
Networking Conference (WCNC), 2003.
[16] Y. Zhang, Wei Liu, Yuguang Fang, and Dapeng Wu.
Secure localization and authentication in ultra-wideband
sensor networks. IEEE Journal on Selected Areas in
Communications, 24(2), February 2006.
[17] G. Jiang and G. Cybenko, “Temporal and spatial
distributed event correlation for network security”, In
American Control Conference, 2004.
[18] B. Harris and R. Hunt, “TCP/IP security threats and
attack methods”, In Computer Communications, 1999.
[19] T. Dimitriou, G. Karame and I. Christou, “SuperTrust: A
Secure and Efficient Framework for Handling Trust in
Super Peer Networks”, In Proceedings of ACM PODC,
2007.
[20] G. Karame, I. Christou and T. Dimitriou, “A Secure
Hybrid Reputation Management System for Super-Peer
Networks”, In Proceedings of IEEE CCNC, 2008.