Protecting Data Source Location Privacy in Wireless Sensor Networks against a Global Eavesdropper
暂无分享,去创建一个
[1] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[2] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Ahmad Khonsari,et al. Source Location Anonymity for Sensor Networks , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[4] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[5] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[6] Silvija Kokalj-Filipovic,et al. The quality of source location protection in globally attacked sensor networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[7] Bülent Tavli,et al. Maximizing lifetime of event-unobservable wireless sensor networks , 2011, Comput. Stand. Interfaces.
[8] Liang Chen,et al. A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, International Conference on Intelligent Cloud Computing.
[9] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[10] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[11] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[12] Jie Wu,et al. Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[13] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[14] Basel Alomair,et al. Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[15] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[16] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[18] Fillia Makedon,et al. Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.
[19] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[20] Jing Xu,et al. An efficient location-based compromise-tolerant key management scheme for sensor networks , 2011, Inf. Process. Lett..
[21] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[22] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[23] Carlos F. García-Hernández,et al. Wireless Sensor Networks and Applications: a Survey , 2007 .
[24] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[25] Wenbo Yang,et al. Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation , 2010, UIC.
[26] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[27] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[28] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.
[29] Basel Alomair,et al. Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[30] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[31] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[32] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[33] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[34] Jian Ren,et al. Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.
[35] Xiuzhen Cheng,et al. TPS: a time-based positioning scheme for outdoor wireless sensor networks , 2004, IEEE INFOCOM 2004.
[36] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[37] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[38] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[39] Javier López,et al. Analysis of location privacy solutions in wireless sensor networks , 2011, IET Commun..
[40] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[41] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..