[1] |
孙利民, 张远, 刘庆超 , 等. 无线传感器网络基础[M]. 北京: 清华大学出版社, 2014: 3-13.
|
|
SUN L M , ZHANG Y , LIU Q C , et al. Fundamentals of wireless sensor networks[M]. Beijing: Tsinghua University, 2014: 3-13.
|
[2] |
YNAG X , MA K . Evolution of wireless sensor network securi-ty[C]// World Automation Congress. 2016:1-5.
|
[3] |
彭辉, 陈红, 张晓莹 , 等. 无线传感器网络位置隐私保护技术[J]. 软件学报, 2015,26(3): 617-637.
|
|
PENG H , CHEN H , ZHANG X Y , et al. Location privacy preservation in wireless sensor networks[J]. Journal of Software. 2015,26(3): 617-637.
|
[4] |
CHENG L , WANG Y , WU H , et al. Non-parametric location esti-mation in rough wireless environments for wireless sensor net-work[J]. Sensors and Actuators A:Physical, 2015,224: 57-64.
|
[5] |
WANG H , SHENG B , LI Q . Privacy-aware routing in sensor net-works[J]. Computer Networks, 2009,53(9): 1512-1529.
|
[6] |
GROAT M , HE W . FORREST S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor net-works[C]// The IEEE INFOCOM. 2011:2024-2032.
|
[7] |
BABAR , STANGO A , PRASAD N , et al. Proposed embedded security framework for Internet of Things (IoT)[C]// The Wireless Communication,Vehicular Technology. 2011:1-5.
|
[8] |
ROY K , KUMAR P . Source location privacy using fake source and phantom routing(FSAPR) technique in wireless sensor networks[J]. Procedia Computer Science, 2015,57: 936-941.
|
[9] |
OZTURK C , ZHANG Y , TRAPPE W . Source-location privacy in energy-constrained sensor network routing[C]// The 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2004:88-93.
|
[10] |
KAMAT P , ZHANG Y , TRAPPE W , et al. Enhancing source- loca-tion privacy in sensor network routing[C]// The 25th IEEE Interna-tional Conference on Distributed Computing Systems. 2005:599-608.
|
[11] |
陈涓, 方滨兴, 殷丽华 , 等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010,33(9): 1736-1747.
|
|
CHEN J , FANG B X , YIN L H , et al. A source-location privacy preservation protocol in wireless sensor networks using sourcebased restricted flooding[J]. Chinese Journal of Computers. 2010,33(9): 1736-1747.
|
[12] |
ZHOU L , WEN Q . Energy efficient source location privacy pro-tecting scheme in wireless sensor networks using ant colony opti-mization[J]. Journal of Distributed Sensor Networks, 2014(1): 1-14.
|
[13] |
贾宗璞, 魏晓娟, 彭维平 , 等. WSNs中基于随机角度和圆周路由的源位置隐私保护策略研究[J]. 计算机应用研究, 2016,33(3): 886-890.
|
|
JIA Z P , WEI X J , PENG W P , et al. Privacy protection strategy about source location in WSNs based on random angle and circumferential routing[J]. Application Research of Computers. 2016,33(3): 886-890.
|
[14] |
LI S , XIAO Y , LIN Q . A novel routing strategy to provide source location privacy in wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2016,21(4): 298-306.
|
[15] |
SATHISHKUMAR J , DHIREN R . Enhanced location privacy algorithm for wireless sensor network in Internet of things[C]// 2016 International Conference on Internet of Things and Applica-tions (IOTA) Maharashtra Institute of Technology. 2016:208-212.
|
[16] |
RAJ M , LI N , LIU D , et al. Using data mules to preserve source location privacy in wireless sensor networks[J]. Pervasive and Mo-bile Computing. 2014,11: 244-260.
|
[17] |
CHEN H , LOU W . On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks[J]. Perva-sive and Mobile Computing. 2015,16: 36-50.
|
[18] |
徐智富 . 无线传感器网络位置隐私保护机制的研究与实现[D]. 成都:电子科技大学, 2014.
|
|
XU F Z . Research and implementation of location privacy protection solution in wireless sensor network[D]. Chengdu:University of Electronic Science and Technology of China. 2014.
|
[19] |
张江南, 褚春亮 . 无线传感器网络中源节点位置隐私保护方案研究[J]. 传感技术学报, 2016,9(9): 1405-1409.
|
|
ZHANG J N , CHU C L . A Scheme to protect the source location privacy in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators. 2016,9(9): 1405-1409.
|
[20] |
SHAO M , YANG Y , ZHU S , et al. Towards statistically strong source anonymity for sensor networks[C]// The 27th Conference on Computer Communications. 2008:51-55.
|
[21] |
ANDERSON W . Anderson-darling tests of goodness-of-fit[M]. International Encyclopedia of Statistical Science. Berlin: Springe. 2011.52-54.
|
[22] |
邓美清, 彭代渊 . 节能无线传感器网络源位置隐私保护方案设计[C]// 2015年信息、电子与控制技术学术会议(IECT 15)论文集, 2015: 11-15.
|
|
DENG M Q , PENG D X . Energy-efficient design on source location privacy preservation in wireless sensor networks[C]// 2015 Symposium on Information,Electronics,and Control Technologies. 2015: 11-15.
|
[23] |
XIAO W , ZHANG H , WEN Q , et al. Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN[C]// The 5th IEEE International Conference on Broadband Network & Multimedia Technology. 2013:289-293.
|
[24] |
胡小燕 . 面向全局攻击的无线传感器网络源节点位置隐私保护研究[D]. 长沙:中南大学, 2014.
|
|
HU X Y , . Research on the source-location privacy in wireless sensor networks against a global eavesdropper[D]. Changsha:Central South University. 2014.
|
[25] |
LERON L , JIAN R . R-STaR destination-location privacy schemes in wireless sensor networks[C]// IEEE International Conference on Communications. 2015:7335-7340.
|
[26] |
牛晓光, 魏川博, 姚亚兰 . 传感网中能量均衡高效的源位置隐私保护协议[J]. 通信学报, 2016,37(4): 23-33.
|
|
NIU X G , WEI C B , YAO Y L . Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN[J]. Journal on Communications, 2016,37(4): 23-33.
|
[27] |
ZHANG J , JIN Z . Energy-aware location privacy routing for wire-less sensor networks[C]// Springer International Publishing. 2016:26-32.
|
[28] |
常芬, 崔杰, 王良民 . WSN中基于椭圆曲线的可追踪匿名认证方案[J]. 计算机研究与发展, 2017,54(9): 2011-2020.
|
|
CHANG F , CUI J , WANG L M . A traceable and anonymous au-thentication scheme based on elliptic curve for wireless sensor network[J]. Journal of Computer Research and Development, 2017,54(9): 2011-2020.
|
[29] |
GURJAR A , PATIL B . Cluster based anonymization for source location privacy in wireless sensor network[C]// The International Conference on Communication Systems and Network Technologies. 2013:248-251.
|
[30] |
YAO L , KANG L , SHANG P F , et al. protecting the sink location privacy in wireless sensor networks[J]. Personal and Ubiquitous Computing, 2013,17(5): 883-893.
|
[31] |
PRIYADARSHINI P , PANDEL M . Concealing of the base station's location for preserving privacy in wireless sensor network by miti-gating traffic patterns[C]// IEEE International Conference on Ad-vanced Communication Control and Computing Technologies. 2014:852-857.
|
[32] |
RIOS R , CUELLAR J , LOPEZ J . Probabilistic receiver-location privacy protection in wireless sensor networks[J]. Information Sciences, 2015, 205-223.
|
[33] |
MALVIYA A R , JAGDALE B N . Location privacy of multiple sink using zone partitioning approach in WSN[J]. International Confe-rence on Applied & Theoretical Computing & Communication Technology, 2016, 449-454.
|
[34] |
BANGASH Y , ZENG L , FENG D . MimiBS:mimicking base-station to provide location privacy protection in wireless sensor networks[C]// IEEE International Conference on Networking, 2015: 158-166.
|
[35] |
BANGASH Y , ZENG L , DENG S , et al. Lpsdn:sink-node location privacy in WSNs via SDN approach[C]// IEEE International Confe-rence on Networking, 2016: 1-10.
|
[36] |
WANG J , WANG F , CAO Z , et al. Sink location privacy protection under direction attack in wireless sensor networks[J]. Wireless Network, 2017,23 579-591.
|
[37] |
李福龙 . 无线传感器网络基站位置隐私保护协议研究[D]. 哈尔滨:哈尔滨工业大学, 2012.
|
|
LI F L , . Research on base station location protection in wireless sensor networks[D]. Harbin:Harbin Institute of Technology. 2012.
|
[38] |
CHEN J , ZHANG H , DU X , et al. Base station location protection in wireless sensor networks:attacks and defense[C]// IEEE Interna-tional Conference on Communications (ICC), 2012: 554-559.
|
[39] |
陈娟 . 无线传感器网络中节点位置隐私保护与自治愈技术研究[D]. 哈尔滨:哈尔滨工业大学, 2013.
|
|
CHEN J , . Research on node location protection and self-healing techniques in wireless sensor networks[D]. Harbin:Harbin Institute of Technology. 2013.
|
[40] |
周黎鸣 . 无线传感网中节点位置和数据的隐私保护研究[D]. 北京:北京邮电大学, 2015.
|
|
ZHOU L M , . Research on privacy protection of nodes' location and data in wireless sensor networks[D]. Beijing:Beijing University of Posts & Telecommunications. 2015.
|
[41] |
JIANG R , LUO J , WANG X . An attack tree based risk assessment for location privacy in wireless sensor networks[C]// The 8th IEEE International Conference on Wireless Communications,Network-ing and Mobile Computing (WICOM 2012), 2012: 1-4.
|
[42] |
ZHANG J , CHOW C . REAL:A reciprocal protocol for location privacy in wireless sensor networks[C]// IEEE Transactions on De-pendable and Secure Computing, 2015: 458-471.
|
[43] |
HAYES T , ALI F . Location aware sensor routing protocol for mo-bile wireless sensor networks[J]. IET Wireless Sensor Systems, 2016,6(2): 49-57.
|