共 28 条
- [1] Akyildiz I.F., Su W., Sankarasubramaniam Y., Et al., A survey on sensor networks, IEEE Communications Magazine, 40, 8, pp. 102-114, (2002)
- [2] Gottumukkala V.P.V., Pandit V., Li H., Et al., Base-station location anonymity and security technique (BLAST) for wireless sensor networks, Proc of IEEE Int Conf on Communications (ICC), pp. 6705-6709, (2012)
- [3] Peng H., Chen H., Zhang X., Et al., Location privacy preservation in wireless sensor networks, Journal of Software, 26, 3, pp. 617-639, (2015)
- [4] Li J., Li Y., Ren J., Et al., Hop-by-Hop message authentication and source privacy in wireless sensor networks, IEEE Trans on Parallel and Distributed Systems, 25, 5, pp. 1223-1232, (2014)
- [5] Christin D., Pons-Sorolla D.R., Hollick M., Et al., TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications, Proc of the 9th Int Conf on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, (2014)
- [6] Nezhad A.A., Miri A., Makrakis D., Location privacy and anonymity preserving routing for wireless sensor networks, Computer Networks, 52, 18, pp. 3433-3452, (2008)
- [7] Chen J., Du X., Fang B., An efficient anonymous communication protocol for wireless sensor networks, Wireless Communications and Mobile Computing, 12, 14, pp. 1302-1312, (2012)
- [8] Di Pietro R., Viejo A., Location privacy and resilience in wireless sensor networks querying, Computer Communications, 34, 3, pp. 515-523, (2011)
- [9] Ye F., Luo H., Lu S., Et al., Statistical en-route filtering of injected false data in sensor networks, IEEE Journal on Selected Areas in Communications, 23, 4, pp. 839-850, (2005)
- [10] Zhu S., Setia S., Jajodia S., Et al., An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, Proc of IEEE Symp on Security and Privacy, pp. 259-271, (2004)