A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
暂无分享,去创建一个
[1] Arshad Jhumka,et al. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[3] Ke Xu,et al. An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.
[4] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[5] 田慧,et al. Random Walk Routing in WSNs with Regular Topologies , 2006 .
[6] Honglong Chen,et al. From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.
[7] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[8] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[9] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[10] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[11] Arshad Jhumka,et al. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks , 2015, TrustCom 2015.
[12] Gwillerm Froc,et al. Random walk based routing protocol for wireless sensor networks , 2007, ValueTools '07.
[13] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[14] Arshad Jhumka,et al. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..
[15] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[16] Jie Gao,et al. Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.
[17] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[18] Yunhao Liu,et al. End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[19] Seung-Woo Seo,et al. Source-Location Privacy in Wireless Sensor Networks , 2007 .
[20] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[21] Yik-Chung Wu,et al. Clock Synchronization of Wireless Sensor Networks , 2011, IEEE Signal Processing Magazine.
[22] Mianxiong Dong,et al. Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.
[23] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[24] Arshad Jhumka,et al. Fake source‐based source location privacy in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[25] Fillia Makedon,et al. Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.
[26] Giacomo Morabito,et al. Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.
[27] Sébastien Tixeuil,et al. Discovering Network Topology in the Presence of Byzantine Faults , 2006, IEEE Transactions on Parallel and Distributed Systems.
[28] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[29] Francesco Palmieri,et al. Condensation-based routing in mobile ad-hoc networks , 2012, Mob. Inf. Syst..
[30] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.