Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization
暂无分享,去创建一个
[1] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.
[2] Bülent Tavli,et al. Maximizing lifetime of event-unobservable wireless sensor networks , 2011, Comput. Stand. Interfaces.
[3] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[4] Wei Liang,et al. An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge , 2013, Int. J. Distributed Sens. Networks.
[5] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[6] Srikanth V. Krishnamurthy,et al. Cross-layer Enhanced Source Location Privacy in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Huagang Xiong,et al. An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[8] Xiaoyan Hong,et al. Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[9] Luca Maria Gambardella,et al. Ant colony system: a cooperative learning approach to the traveling salesman problem , 1997, IEEE Trans. Evol. Comput..
[10] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[11] Stephen B. Wicker,et al. Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.
[12] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[13] Marco Dorigo,et al. Optimization, Learning and Natural Algorithms , 1992 .
[14] Konstantinos Kalpakis,et al. Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks , 2003, Comput. Networks.
[15] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.
[16] Zhi Zhou,et al. Anonymizing geographic ad hoc routing for preserving location privacy , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[17] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[18] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[19] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[20] Fernando Boavida,et al. An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks , 2006, ANTS Workshop.
[21] Eui-nam Huh,et al. A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks , 2012, Secur. Commun. Networks.
[22] Ju Ren,et al. An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[23] Chun-Ta Li,et al. A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..
[24] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[25] Javier López,et al. Analysis of location privacy solutions in wireless sensor networks , 2011, IET Commun..
[26] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[27] Sajal K. Das,et al. Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks , 2012, ICDCN.
[28] Feng Xia,et al. Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks , 2011, J. Comput. Syst. Sci..
[29] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[30] Xiaodong Lin,et al. TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.
[31] Selcuk Okdem,et al. Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) Router Chip , 2009, Sensors.
[32] Riccardo Bettati,et al. On Flow Marking Attacks in Wireless Anonymous Communication Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[33] Basel Alomair,et al. Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[34] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.