DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 2 Issue 2 Date of Publication:   December 2013

Detection and Implementation of Neighbor Positions in Wireless Networks

R.Sangeetha,Viji vinod

Page(s):   49-51 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.002.002.007 Publisher:   Integrated Intelligent Research (IIR)


  1. P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux,   "Secure Vehicular Communications: Design and Architecture",   IEEE Comm. Magazine   ,2008
    View Artical

  2. P. Papadimitratos and A. Jovanovic,   "GNSS-Based Positioning: Attacks and Countermeasures",   Proc. IEEE Military Comm. Conf. (MILCOM),
    View Artical

  3. L. Lazos and R. Poovendran,   "HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks",   IEEE J. Selected Areas in Comm.   ,2006
    View Artical

  4. R. Poovendran and L. Lazos,   "A Graph Theoretic Framework for Preventing the Wormhole Attack   ,2007
    View Artical

  5. S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao,   "Towards a Theory of Robust Localization against Malicious Beacon Nodes   ,2008
    View Artical

  6. P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S.Capkun, and J.-P. Hubaux,   "Secure Neighborhood Discovery:AFundamental Element for Mobile Ad Hoc Networks",   IEEE Comm. Magazine   ,2008
    View Artical

  7. Y.-C. Hu, A. Perrig, and D.B. Johnson,   "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks   ,2003
    View Artical

  8. J. Eriksson, S. Krishnamurthy, and M. Faloutsos,   "TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks",   IEEE 14th Int?l Conf. Network Protocols (ICNP)   ,2006
    View Artical

  9. R. Maheshwari, J. Gao, and S. Das,   "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information   ,2007
    View Artical

  10. R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux,   "A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks",   Proc. Second ACM Conf. Wireless Network Security   ,2009
    View Artical

  11. M. Poturalski, P. Papadimitratos, and J.-P. Hubaux,   "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility   ,2008
    View Artical

  12. E. Ekici, S. Vural, J. McNair, and D. Al-Abri,   "Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks",   Elsevier Ad Hoc Networks   ,2008
    View Artical

  13. J. Chiang, J. Haas, and Y. Hu,   "Secure and Precise Location Verification Using Distance Bounding and Simultaneous Multilateration",   Second ACM Conf. Wireless Network Security (WiSec)   ,2009
    View Artical

  14. S. _Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava,   "Secure Location Verification with Hidden and Mobile Base Stations",   IEEE Trans. Mobile Computing   ,Vol.7   ,Issue 4   ,2008
    View Artical

  15. S. _Capkun and J.-P. Hubaux,   "Secure Positioning in Wireless Networks",   IEEE J. Selected Areas in Comm   ,Vol.24   ,2006
    View Artical

  16. A. Vora and M. Nesterenko,   "Secure Location Verification UsingRadio Broadcast",   IEEE Trans. Dependable and Secure Computing   ,Vol.3   ,2006
    View Artical

  17. J. Hwang, T. He, and Y. Kim,   "Detecting Phantom Nodes in Wireless Sensor Networks   ,2007
    View Artical