Novel Scheme of Fuzzy based Concealing Sink Node with Fake Holes (F-CSH)
暂无分享,去创建一个
[1] H. Fahham,et al. Design Chattering-Free Performance-Based Fuzzy Sliding Mode Controller for Bus Suspension , 2012 .
[2] Leonidas J. Guibas,et al. Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.
[3] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] Ananthram Swami,et al. Wireless Sensor Networks: Signal Processing and Communications , 2007 .
[5] Ming Gu,et al. Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[6] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Peter Csaba Ölveczky,et al. Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude , 2009, Theor. Comput. Sci..
[8] W. Chung,et al. Enhanced Rssi-Based High Accuracy Real-Time User Location Tracking System For Indoor And Outdoor Environments , 2008 .
[9] A. Boukerche,et al. Selective Encryption Algorithm for Wireless Ad-hoc Networks , 2012 .
[10] Wenyuan Xu,et al. Determining sink location through Zeroing-In attackers in wireless sensor networks , 2012, Wirel. Networks.
[11] Pragati Patil,et al. Survey On Location Privacy Preserving Schemes In Wireless Sensor Network , 2012 .
[12] Kamarulzaman Ab. Aziz,et al. Coverage Strategies for Wireless SensorNetworks , 2009, Journal of Science and Technology.
[13] Lin Yao,et al. Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[14] I Manimozhi,et al. Mitigating Hotspot Locating Attack in Wireless Sensor Network , 2013 .
[15] Liang Liu,et al. An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[16] Jian Ren,et al. Routing-based source-location privacy protection in wireless sensor networks , 2009, 2009 IEEE International Conference on Electro/Information Technology.
[17] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[18] Dimitrios Makrakis,et al. Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] K. Janani,et al. Securing the Location Privacy in wireless Sensor Networks , 2013 .
[20] Azer Bestavros,et al. SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .