An energy-efficient source-anonymity protocol in surveillance systems
暂无分享,去创建一个
Xu Chen | Jin Liu | Yihao Zhang | Xiaoguang Niu | Josep Miquel Jornet | Yalan Yao | J. Jornet | Yihao Zhang | Yalan Yao | Xiaoguang Niu | Xu Chen | Jin Liu
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Arshad Jhumka,et al. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[4] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[5] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[6] Roberto Di Pietro,et al. Events privacy in WSNs: A new model and its application , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[7] Jie Wu,et al. Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[8] Honglong Chen,et al. On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..
[9] Jian Ren,et al. Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[10] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[11] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] Basel Alomair,et al. Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[13] Mianxiong Dong,et al. An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..
[14] S. Sitharama Iyengar,et al. In-Network Trajectory Privacy Preservation , 2015, ACM Comput. Surv..
[15] Xuemin Shen,et al. Secure and efficient source location privacy-preserving scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[16] Javier López,et al. Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks , 2011, Comput. J..
[17] Prabhat Kumar,et al. Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks , 2015 .
[18] Arshad Jhumka,et al. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Mauro Conti,et al. Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[20] Yunchuan Sun,et al. An extensible and active semantic model of information organizing for the Internet of Things , 2014, Personal and Ubiquitous Computing.
[21] Lin Yao,et al. Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[22] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[23] Bernhard Rinner,et al. Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..
[24] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[25] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[26] Hongyang Zhang,et al. Square-root unscented Kalman filtering-based localization and tracking in the Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[27] Heejo Lee,et al. Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.
[28] Yihua Zhang,et al. All proxy scheme for event source anonymity in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[29] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[30] Houbing Song,et al. Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.