Base station location protection in wireless sensor networks: Attacks and defense
暂无分享,去创建一个
[1] Mohamed F. Younis,et al. Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.
[2] Wenyuan Xu,et al. Zeroing-in on network metric minima for sink location determination , 2010, WiSec '10.
[3] Mario Gerla,et al. Performance evaluation of distributed localization techniques for mobile underwater acoustic sensor networks , 2011, Ad Hoc Networks.
[4] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[5] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[6] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] John Heidemann,et al. MAC Stability in Sensor Networks at High Network Densities , 2007 .
[8] S. C. Johnson. Hierarchical clustering schemes , 1967, Psychometrika.
[9] Jian Ren,et al. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] R.L. Moses,et al. Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[11] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[12] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.