共 16 条
[1]
Yong X., Schwiebert L., Weisong S., Preserving source location privacy in monitoring-based wireless sensor networks, IPDPS 2006: Proceedings of the 20th International Parallel and Distributed Processing Symposium, (2006)
[2]
Rios R., Lopez J., Analysis of location privacy solutions in wireless sensor networks, IET Commun, 5, pp. 2518-2532, (2011)
[3]
Pai S., Bermudez S., Wicker S., Et al., Transactional confidentiality in sensor networks, IEEE Security and Privacy, 6, pp. 28-35, (2008)
[4]
Saponas T.S., Lester J., Hartung C., Agarwal S., Kohno T., Devices that tell on you: Privacy trends in consumer ubiquitous computing, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (2007)
[5]
Srinivasan V., Stankovic J., Whitehouse K., Protecting your daily in-home activity information from a wireless snooping attack, UbiComp'08: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 202-211, (2008)
[6]
Kamat P., Zhang Y.Y., Trappe W., Ozturk C., Enhancing source-location privacy in sensor network routing, ICDCS 2005: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 599-608, (2005)
[7]
Karp B., Kung H.T., GPSR: Greedy perimeter stateless routing for wireless networks, Mobi-Com'00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, (2000)
[8]
Zhang Y., Liu W., Lou W., Fang Y., MASK: Anonymous on-demand routing in mobile ad hoc networks, IEEE Transactions on Wireless Communications, 5, pp. 2376-2385, (2006)
[9]
Fu X., Zhu Y., Graham B., Bettati R., Zhao W., On flow marking attacks in wireless anonymous communication networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 493-503, (2005)
[10]
Ozturk C., Zhang Y.Y., Trappe W., Source-location privacy in energy-constrained sensor network routing, SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88-93, (2004)