[1] |
OZTURK C , ZHANG Y , TRAPPE W . Source-location privacy in energy-constrained sensor network routing[A]. Proc of ACM SASN,Washington[C]. DC,USA, 2004. 88-93.
|
[2] |
KAMAT P , ZHANG Y , TRAPPE W ,et al. Enhancing source-location privacy in sensor network routing[A]. Proc of IEEE ICDCS[C]. Columbus,OH,USA, 2005. 599-608.
|
[3] |
CONTI M , WILLEMSEN J , CRISPO B . Providing source location privacy in wireless sensor networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2013,15(3): 1238-1280.
|
[4] |
SHAO M , YANG Y , ZHU S ,et al. Towards statistically strong source anonymity for sensor networks[A]. Proc of IEEE INFOCOM[C]. Phoenix,AZ,USA, 2008. 51-55.
|
[5] |
AHN G.S. , HONG S.G. , MILUZZO E . Funneling-MAC:a localized,sink-oriented MAC for boosting fidelity in sensor networks[A]. Proc of ACM SenSys[C]. Boulder,Colorado,USA, 2006. 293-306.
|
[6] |
YANG Y , SHAO M , ZHU S ,et al. Towards event source unobservability with minimum network traffic in sensor networks[A]. Proc of ACM WiSec[C]. Alexandria,Virginia,USA, 2008. 77-88.
|
[7] |
陈娟, 方滨兴, 殷丽华 ,等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010,33(9): 1736-1747. CHEN J , FANG B X , YIN L H ,et al. A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding[J]. Chinese Journal of Computers, 2010,33(9): 1736-1747.
|
[8] |
XI Y , SCHWIEBERT L , SHI W . Preserving source location privacy in monitoring-based wireless sensor networks[A]. Proc of IEEE IPDPS[C]. Rhodes Island,Greece, 2006. 1-8.
|
[9] |
LI Y , REN J . Source-location privacy through dynamic routing in wireless sensor networks[A]. Proc of IEEE INFOCOM[C]. San Diego,California,USA, 2010. 1-9.
|
[10] |
YAO L , KANG L , DENG F ,et al. Protecting source–location privacy based on multirings in wireless sensor networks[J].Concurrency Computat.:Pract.Exper,2013.DOI:10.1002/cpe.3075.
|
[11] |
OUYANG Y , LE Z , CHEN G ,et al. Entrapping adversaries for source protection in sensor networks[A]. Proc of IEEE WoWMoM[C]. NewYork,USA, 2006. 23-34.
|
[12] |
RIOS R , LOPEZ J . Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J]. Computer Journal, 2011,54(10): 1603-1615.
|
[13] |
MEHTA K , LIU D , WRIGHT M . Location privacy in sensor networks against a global eavesdropper[A]. Proc of IEEE ICNP[C]. Beijing,China, 2007. 314-323.
|
[14] |
ALOMAIR B , CLARK A , CUELLAR J ,et al. Towards a statisticalframework for source anonymity in sensor networks[J]. IEEE Trans on Mobile Computing , 2013,12(2): 248-260.
|
[15] |
CUELLAR J , POOVENDRAN R . Toward a statistical framework for source anonymity in sensor networks[J]. IEEE Trans on Mobile Computing, 12(2): 248-260. 2013.
|
[16] |
MEHTA K , LIU D , WRIGHT M . Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Trans on Mobile Computing, 2012,11(2): 320-336.
|
[17] |
MAHMOUD M M , SHEN X S . Secure and efficient source location privacy preserving scheme for wireless sensor networks[A]. Proc of IEEE ICC[C]. Ottawa,CANADA, 2012. 1-5.
|
[18] |
LIGHTFOOT L , LI Y , REN J . Preserving source-location privacy in wireless sensor network using Star routing[A]. Proc of IEEE Globecom[C]. Miami,Florida,USA, 2010. 1-5.
|
[19] |
MAHMOUD M M , SHEN X S . A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks[J]. IEEE Trans on Parallel and Distributed Systems, 2012,23(10): 1805-1818.
|
[20] |
LI Y , REN J , WU J . Quantitative measurement and design of sourcelocation privacy schemes for wireless sensor networks[J]. IEEE Trans on Parallel and Distributed Systems, 2012,23(7): 1302-1311.
|