Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10
Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE international conference on computer communications (INFOCOM). March 2000, pp. 775–784.
He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2005). Range-free localization and its impact on large scale sensor networks. ACM Transactions on Embedded Computing Systems, 4
Chen, Y., Francisco, J., Trappe, W., & Martin, R. P. (2006). A practical approach to landmark deployment for indoor localization. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON).
Kleisouris, K., Chen, Y., Yang, J., & Martin, R. P. (2008). The impact of using multiple antennas on wireless localization. In Proceedings of the fifth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2008.
Proakis, J. G. (2000). Digital communications (4th ed.). Singapore: McGraw-Hill.
Schleher, C. (1999). Electronic warfare in the information age. Norwood: MArtech House.
Wood, A., Stankovic, J., & Son, S. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems Symposium. pp. 286–297.
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05: Proceedings of the 6th ACM international Symposium on mobile ad hoc networking and computing. pp. 46–57.
Çakiroǧlu, M., & Özcerit, A. T. (2008). Jamming detection mechanisms for wireless sensor networks. In InfoScale ’08: Proceedings of the 3rd international conference on scalable information systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–8.
Mraleedharan, R., & Osadciw, L. A. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system,” in Proceedings of the SPIE in wireless sensing and processing, (Vol. 6248). p. 62480G.
Chiang, J. T., & Hu, Y.-C. (2007). Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom ’07: Proceedings of the 13th annual ACM international conference on mobile computing and networking. New York, NY, USA: ACM, pp. 346–349.
Noubir, G. & Lin, G. (2003). Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mobile Computing and Communications Review, 7
Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on information processing in sensor networks. pp. 499–508.
Navda, V., Bohra, A., Ganguly, S., Izmailov, R., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE infocom minisymposium. May 2007, pp. 2526–2530.
Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks,” In Mobiquitous ’08: Proceedings of the 5th annual international conference on mobile and ubiquitous systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.
Ma, K., Zhang, Y., & Trappe, W. (2005). Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the the 1st international workshop on resource provisioning and management in sensor networks (RPMSN05).
Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on wireless network security. New York, NY, USA: ACM, pp. 203–213.
Cagalj, M., Capkun, S., & Hubaux, J. (2007). Wormhole-based anti-jamming techniques in sensor networks. In IEEE transactions on mobile computing. January 2007, pp. 100–114.
Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energyefficient jamming in ieee 802.15.4-based wireless networks,” In Communications society conference on sensor, mesh and ad hoc communications and networks (SECON).
Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of the ACM international conference on mobile computing and networking (MobiCom). Aug 2000, pp. 32–43.
Ward, A., Jones, A., & Hopper, A. (1997). A new location technique for the active office. IEEE Personal Communications, 4
Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2006). The robustness of localization algorithms to signal strength attacks: A comparative study. In Proceedings of the international conference on distributed computing in sensor systems (DCOSS). June 2006, pp. 546–563.
Chandrasekaran, G., Ergin, M. A., Yang, J., Liu, S., Chen, Y., Gruteser, M., & Martin, R. (2009). Empirical evaluation of the limits on localization using signal strength. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2009.
Hightower, J., Borriello, G., & Want, R. (2000). Spoton: An indoor 3d location sensing technology based on RF signal strength. University of Washington, Dept. of Computer Science and Engineering, Technical Report 00-02-02, February 2000.
Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Ganga-Jamuna Pr.
He, T., Huang, C., Blum, B., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes in large scale sensor networks. In Proceedings of the ninth annual ACM international conference on mobile computing and networking (MobiCom’03).
Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7
Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of the IEEE global telecommunications conference (GLOBECOM). pp. 2926–2931.
Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings of the fourth ACM international Symposium on mobile ad-hoc networking and computing (MobiHoc). Jun 2003, pp. 201–212.
Pelechrinis, K., Koutsopoulos, I., Broustis, I., & Krishnamurthy, S. (2009). Lightweight jammer localization in wireless networks: System design and implementaion. In Proceedings of IEEE global telecommunication cofference (GLOBECOM). December 2009.
Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN ’04: Proceedings of the 2004 international conference on dependable systems and networks. Washington, DC, USA: IEEE Computer Society, p. 637.
Kleppner, D., & Kolenkow, R. J. (1973). An introduction to mechanics. New York: McGraw-Hill.
"Crossbow Technology Inc." white paper available at http://www.xbow.com
Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the first workshop on the security and privacy of emerging ubiquitous communication systems (SPEUCS).
Liu, H., Xu, W., Chen, Y., & Liu, Z. (2009). Localizing jammers in wireless networks. In Proceedings of IEEE PerCom international workshop on pervasive wireless networking (IEEE PWN).