Location Privacy in Sensor Networks Against a Global Eavesdropper
暂无分享,去创建一个
[1] Mike Horton,et al. The platforms enabling wireless sensor networks , 2004, CACM.
[2] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[3] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[4] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[5] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[8] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[9] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[10] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[11] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Mimoza Durresi,et al. Routing through Backbone Structures in Sensor Networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[13] Béla Bollobás,et al. On the Value of a Random Minimum Weight Steiner Tree , 2004, Comb..
[14] Himanshu Gupta,et al. Connected sensor cover: self-organization of sensor networks for efficient query execution , 2003, IEEE/ACM Transactions on Networking.
[15] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[16] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[17] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[20] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[21] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[22] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[23] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[24] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[25] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[26] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..