On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[3] Honglong Chen,et al. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs , 2009, WASA.
[4] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[7] D Estrin,et al. In Vivo Characterization of a Wide area 802.11b Wireless Seismic Array , 2007 .
[8] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[9] Miao Xu,et al. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.
[10] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[11] Honglong Chen,et al. Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.
[12] Paolo Medagliani,et al. Author's Personal Copy Pervasive and Mobile Computing Energy-efficient Mobile Target Detection in Wireless Sensor Networks with Random Node Deployment and Partial Coverage , 2022 .
[13] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[14] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Liang Chen,et al. A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, International Conference on Intelligent Cloud Computing.
[17] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[18] Fillia Makedon,et al. Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.
[19] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[20] Kyriakos Mouratidis,et al. Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity , 2009, SSTD.
[21] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[22] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[23] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[24] Jian Ren,et al. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[25] H. T. Mouftah,et al. A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[26] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[27] Kyriakos Mouratidis,et al. Shortest Path Computation with No Information Leakage , 2012, Proc. VLDB Endow..
[28] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[29] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[30] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[31] Ji Luo,et al. Delay Tolerant Event Collection in Sensor Networks with Mobile Sink , 2010, 2010 Proceedings IEEE INFOCOM.