[1] |
WINKLER T , RINNER R . Security and privacy protection i visual sensor networks: a survey[J]. ACM Computing Surveys(CSUR), 2014,47(1):1501-1514.
|
[2] |
CONTI M , WILLEMSEN J , CRISPO B . Providing source location privacy in wireless sensor networks: a survey[J]. IEEE Communica-tions Surveys & Tutorials, 2013,15(3):1238-1280.
|
[3] |
OZTURK C , ZHANG Y , TRAPPE W . Source-location privacy in energy-constrained sensor network routing[C]// ACM SASN. Washington, DC, USA, c2004:88-93.
|
[4] |
KAMAT P , ZHANG Y , TRAPPE W , et al. Enhancing source-Location privacy in sensor network routing[C]// IEEE ICDCS. Columbus, OH, USA, c2005:599-608.
|
[5] |
陈娟, 方滨兴, 殷丽华 , 等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010,33(9): 1736-1747. CHEN J , FANG B X , YIN L H , et al. A source-location privacy pre-servation protocol in wireless sensor networks using source-based re-stricted flooding[J]. Chinese Journal of Computers, 2010,33(9): 1736-1747.
|
[6] |
RAJ M , LI N , LIU D , et al. Using data mules to preserve source loca-tion privacy in wireless sensor networks[J]. Journal of Elsevier Distri-buted Computing and Networking, 2012,11(2):309-324.
|
[7] |
LI Y , REN J . Source-location privacy through dynamic routing in wireless sensor networks[C]// IEEE INFOCOM. San Diego, California, USA, c2010:1-9.
|
[8] |
YAO L , KANG L , DENG F , et al. Protecting source–location privacy based on multirings in wireless sensor networks[J]. Concurrency Computat Pract Exper, 2013.DOI: 10.1002/cpe.3075.
|
[9] |
REN J , TANG D . Combining source-location privacy and routing effi-ciency in wireless sensor networks[C]// IEEE GLOBECOM. c2011:1-5.
|
[10] |
RIOS R , LOPEZ J . Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J]. Computer Journal, 2011,54(10): 1603-1615.
|
[11] |
MEHTA K , LIU D , WRIGHT M . Location privacy in sensor networks against a global eavesdropper[C]// IEEE ICNP. Beijing, China, c2007:314-323.
|
[12] |
SHAO M , YANG Y , ZHU S , et al. Towards statistically strong source anonymity for sensor networks[C]// IEEE INFOCOM. Phoenix, AZ, USA, c2008:51-55.
|
[13] |
ALOMAIR B , CLARK A , CUELLAR J , et al. Towards a statistical framework for source anonymity in sensor networks[J]. IEEE Trans on Mobile Computing, 2013,12(2): 248-260.
|
[14] |
CUELLAR J , POOVENDRAN R . Toward a statistical framework for source anonymity in sensor networks[J]. IEEE Trans on Mobile Computing, 2013,12(2): 248-260.
|
[15] |
MEHTA K , LIU D , WRIGHT M . Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Trans Mobile Computing, 2012,11(2): 320-336.
|
[16] |
YANG Y , SHAO M , ZHU S , et al. Towards event source unobserva-bility with minimum network traffic in sensor networks[C]// ACM WiSec. Alexandria, Virginia, USA, c2008:77-88.
|
[17] |
MAHMOUD M M , SHEN X S . Secure and efficient source location privacy preserving scheme for wireless sensor networks[C]// IEEE ICC. Ottawa, CANADA, c2012:1-5.
|
[18] |
LIGHTFOOT L , LI Y , REN J . Preserving source-location privacy in wireless sensor network using STaR routing[C]// IEEE Globecom. Miami, Florida, USA, c2010:1-5.
|
[19] |
MAHMOUD M M , SHEN X S . A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks[J]. IEEE Trans on Parallel and Distrib Systems, 2012,23(10): 1805-1818.
|
[20] |
LI Y , REN J , WU J . Quantitative measurement and design of source-location privacy schemes for wireless sensor networks[J]. IEEE Trans on Parallel and Distributed Systems, 2012,23(7): 1302-1311.
|