Forming a cluster-mesh topology to boost base-station anonymity in wireless sensor networks
暂无分享,去创建一个
[1] Mohamed F. Younis,et al. On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor Networks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[2] Amitava Datta,et al. Energy-Efficient Communication Protocols for Wireless Networks , 2003, ICOIN.
[3] M. Mehdi Afsar,et al. Clustering in sensor networks: A literature survey , 2014, J. Netw. Comput. Appl..
[4] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[5] Jayme Luiz Szwarcfiter,et al. Hamilton Paths in Grid Graphs , 1982, SIAM J. Comput..
[6] Mohamed F. Younis,et al. Providing location anonymity in a multi-base station wireless sensor network , 2012, 2012 IEEE International Conference on Communications (ICC).
[7] Mohamed F. Younis,et al. Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[8] J. Monnot,et al. The Traveling Salesman Problem and its Variations , 2014 .
[9] Bülent Yener,et al. On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.
[10] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[11] Jehn-Ruey Jiang,et al. An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks , 2011, J. Inf. Sci. Eng..
[12] W. Marsden. I and J , 2012 .
[13] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[14] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[15] Yuh-Ren Tsai,et al. Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability , 2011, IEEE Journal on Selected Areas in Communications.
[16] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[17] Klara Nahrstedt,et al. Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks , 2006, DCOSS.
[18] Dijiang Huang. On Measuring Anonymity For Wireless Mobile Ad-hoc Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[19] Adel Youssef,et al. Salam: a Scalable Anchor-Free localization Algorithm for Wireless Sensor Networks , 2006 .
[20] Christopher Umans,et al. Hamiltonian cycles in solid grid graphs , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[21] Mohamed F. Younis,et al. Increasing Transmission Power for Higher Base-Station Anonymity in Wireless Sensor Network , 2011, 2011 IEEE International Conference on Communications (ICC).
[22] Gerald L. Thompson,et al. Hamiltonian Tours and Paths in Rectangular Lattice Graphs , 1977 .
[23] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[24] Bart Preneel,et al. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[25] Mohamed F. Younis,et al. Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.
[26] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[27] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[28] Mohamed F. Younis,et al. Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.