Routing for enhancing source-location privacy in wireless sensor networks of multiple assets
暂无分享,去创建一个
[1] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[2] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[3] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[4] Brad Karp,et al. Greedy Perimeter Stateless Routing for Wireless Networks , 2000 .
[5] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[6] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Shuvra S. Bhattacharyya,et al. Energy-Aware Data Compression for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[8] Leonard Kleinrock,et al. The Spatial Capacity of a Slotted ALOHA Multihop Packet Radio Network with Capture , 1984, IEEE Trans. Commun..
[9] Hsiao-Hwa Chen,et al. Special issue on Security on Wireless Ad Hoc and Sensor Networks , 2007, Comput. Commun..
[10] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[11] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[13] Boleslaw K. Szymanski,et al. Local leader election, signal strength aware flooding, and routeless routing , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[14] Ivan Stojmenovic,et al. On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks , 2006, MobiCom '06.
[15] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[16] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[17] David S. Johnson,et al. Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .
[18] Nitin H. Vaidya,et al. Geocasting in mobile ad hoc networks: location-based multicast algorithms , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[19] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[20] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.