Location Privacy and Energy Preservation in Sensor Allocation Systems
暂无分享,去创建一个
[1] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[2] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[3] Samuel S. Blackman,et al. Design and Analysis of Modern Tracking Systems , 1999 .
[4] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[5] Thomas F. La Porta,et al. Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] Wendi B. Heinzelman,et al. Optimal sensor management under energy and reliability constraints , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[7] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[8] Tatsuya Suda,et al. Coverage-aware sensor engagement in dense sensor networks , 2009, J. Embed. Comput..
[9] Alun D. Preece,et al. Detection and Localization Sensor Assignment with Exact and Fuzzy Locations , 2009, DCOSS.
[10] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[11] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.
[13] Alun D. Preece,et al. Sensor-Mission Assignment in Constrained Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[14] Scott Shenker,et al. Geographic routing without location information , 2003, MobiCom '03.
[15] Kuei-Ping Shih,et al. A Distributed Active Sensor Selection Scheme for Wireless Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[16] Thomas F. La Porta,et al. Sensor-mission assignment in wireless sensor networks , 2010, TOSN.
[17] Stephanie J. Tutton. Optimizing the Allocation of Sensor Assets for the Unit of Action , 2003 .
[18] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[19] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[20] Franz Aurenhammer,et al. Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.
[21] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[22] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[23] Dinesh Verma,et al. A survey of sensor selection schemes in wireless sensor networks , 2007, SPIE Defense + Commercial Sensing.