On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
暂无分享,去创建一个
[1] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[2] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[3] Felix C. Freiling,et al. Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .
[4] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[5] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[6] Arshad Jhumka,et al. Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[7] Fillia Makedon,et al. Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.
[8] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[10] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[11] Seung-Woo Seo,et al. Source-Location Privacy in Wireless Sensor Networks , 2007 .
[12] Yeonghwan Tscha. Routing for enhancing source-location privacy in wireless sensor networks of multiple assets , 2009, Journal of Communications and Networks.
[13] Volkan Isler,et al. Triangulation Based Multi Target Tracking with Mobile Sensor Networks , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[14] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[15] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Giacomo Morabito,et al. Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.
[17] Jian Ren,et al. Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.
[18] Hisashi Kobayashi,et al. Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.