Fake source‐based source location privacy in wireless sensor networks
暂无分享,去创建一个
[1] Seung-Woo Seo,et al. Source-Location Privacy in Wireless Sensor Networks , 2007 .
[2] Fillia Makedon,et al. Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.
[3] Amy L. Murphy,et al. Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[4] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[5] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[6] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[7] Gwillerm Froc,et al. Random walk based routing protocol for wireless sensor networks , 2007, ValueTools '07.
[8] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[9] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[10] Sandeep S. Kulkarni,et al. Self-stabilizing Deterministic TDMA for Sensor Networks , 2005, ICDCIT.
[11] Sébastien Tixeuil,et al. Discovering Network Topology in the Presence of Byzantine Faults , 2006, IEEE Transactions on Parallel and Distributed Systems.
[12] Giacomo Morabito,et al. Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.
[13] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[14] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[15] Arshad Jhumka,et al. Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[16] Francesco Palmieri,et al. Condensation-based routing in mobile ad-hoc networks , 2012, Mob. Inf. Syst..
[17] Arshad Jhumka,et al. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..
[18] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[19] Hong Shen,et al. Random Walk Routing in WSNs with Regular Topologies , 2006, Journal of Computer Science and Technology.
[20] Gerhard Maierbacher,et al. Low-complexity coding and source-optimized clustering for large-scale sensor networks , 2008, TOSN.
[21] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[22] Hisashi Kobayashi,et al. Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.