Location Privacy Preservation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Srikanth V. Krishnamurthy,et al. Cross-layer Enhanced Source Location Privacy in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[2] Xi Fang,et al. Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[4] Fan Zhang,et al. Data perturbation with state-dependent noise for participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[5] Leonidas Kazatzopoulos,et al. iHIDE: hiding sources of information in WSNs , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[6] Arshad Jhumka,et al. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[7] Jiming Chen,et al. Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[8] Wang Lu,et al. Location Privacy Preservation in Big Data Era: A Survey , 2014 .
[9] Xiaojiang Du,et al. An efficient anonymous communication protocol for wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..
[10] Neeraj Mittal,et al. Secure Location Verification with Randomly-Selected Base Stations , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[11] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.
[12] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[13] Jian Ren,et al. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Wang An. An Energy-Saving Privacy-Preserving Data Aggregation Algorithm , 2011 .
[15] Salil S. Kanhere,et al. TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[16] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Marco Gruteser,et al. USENIX Association , 1992 .
[19] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[20] K. Nahrstedt,et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[21] Hong Chen,et al. Data Privacy Preservation in Wireless Sensor Networks , 2012 .
[22] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[23] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] Yun Liu,et al. High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..
[25] Wei Zhang,et al. A Collaboratively Hidden Location Privacy Scheme for VANETs , 2014, Int. J. Distributed Sens. Networks.
[26] Roberto Di Pietro,et al. Location privacy and resilience in wireless sensor networks querying , 2011, Comput. Commun..
[27] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[28] Miao Xu,et al. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.
[29] Jie Gao,et al. Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.
[30] Lei Kang,et al. Protecting Location Privacy in Large-Scale Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[31] Li Xiao,et al. Maintaining source privacy under eavesdropping and node compromise attacks , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Wang Wei-ping,et al. A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, 2008 IEEE International Conference on Communications.
[33] Wensheng Zhang,et al. ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query , 2009, IEEE INFOCOM 2009.
[34] Petros Spachos,et al. Improving source-location privacy through opportunistic routing in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[35] Honglong Chen,et al. On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..
[36] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[37] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[38] Nitin H. Vaidya,et al. A new ‘Direction’ for source location privacy in wireless sensor networks' , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[39] Silvija Kokalj-Filipovic,et al. The quality of source location protection in globally attacked sensor networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[40] Guohong Cao,et al. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.
[41] Xiaoyan Hong,et al. Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[42] Lin Yao,et al. Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[43] Alex X. Liu,et al. SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[44] Chen Juan. A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .
[45] Shuai Li,et al. Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[46] Rinku Dewri,et al. Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.
[47] Zohra Binte Sailan,et al. Hop by Hop Message Authentication and Source Privacy in Wireless Sensor Networks , 2015 .
[48] Nael B. Abu-Ghazaleh,et al. TARP: Timing Analysis Resilient Protocol for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[49] Jiannong Cao,et al. Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.
[50] Dimitrios Makrakis,et al. Location privacy and anonymity preserving routing for wireless sensor networks , 2008, Comput. Networks.
[51] Aggelos Kiayias,et al. Secure and efficient in-network processing of exact SUM queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[52] Qiaoyan Wen,et al. Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.
[53] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[54] Xiaohui Liang,et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.
[55] Heejo Lee,et al. Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.
[56] Fan Yong. Verifiable Privacy-Preserving Top-k Query Protocol in Two-tiered Sensor Networks , 2012 .
[57] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2009, MSWiM '09.
[58] Jun Luo,et al. An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[59] Jie Wu,et al. Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[60] Xuemin Shen,et al. A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs , 2013, IEEE Transactions on Intelligent Transportation Systems.
[61] Xuemin Shen,et al. Secure and efficient source location privacy-preserving scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[62] Rui Zhang,et al. Secure Range Queries in Tiered Sensor Networks , 2009, IEEE INFOCOM 2009.
[63] Qiaoyan Wen,et al. Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization , 2014, Int. J. Distributed Sens. Networks.
[64] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[65] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.
[66] Sriram Chellappan,et al. Defending Wireless Sensor Networks against Adversarial Localization , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[67] Rui Zhang,et al. Secure multidimensional range queries in sensor networks , 2009, MobiHoc '09.
[68] Jian Ren,et al. Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[69] Javier López,et al. Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks , 2011, Comput. J..