Hybrid online protocols for source location privacy in wireless sensor networks
暂无分享,去创建一个
[1] Alina-Mihaela Badescu,et al. A wireless sensor network to monitor and protect tigers in the wild , 2015 .
[2] Felix C. Freiling,et al. Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .
[3] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[4] Riccardo Bettati,et al. On countermeasures to traffic analysis attacks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[5] Arshad Jhumka,et al. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Roberto Gorrieri,et al. Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.
[7] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[8] Arshad Jhumka,et al. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..
[9] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[10] Mauro Conti,et al. Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[11] Mohamed F. Younis,et al. Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor Network , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[12] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[13] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[14] Yi Sun,et al. A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs , 2015, SAC.
[15] Matthew Bradbury,et al. Towards fake sources for source location privacy in wireless sensor networks with multiple sources , 2016, 2016 IEEE International Conference on Communication Systems (ICCS).
[16] Jie Gao,et al. Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.
[17] Lin Yao,et al. Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[18] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[19] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[20] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[21] Cecilia Mascolo,et al. WILDSENSING , 2012, ACM Trans. Sens. Networks.
[22] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[23] Abdul Hanan Abdullah,et al. Isolated Adversary Zone for source location privacy in Wireless Sensor Networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[24] Arshad Jhumka,et al. Deconstructing source location privacy-aware routing protocols , 2017, SAC.
[25] Arshad Jhumka,et al. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[26] Jian Ren,et al. STaR: design and quantitative measurement of source-location privacy for wireless sensor networks , 2016, Secur. Commun. Networks.
[27] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[28] Philip Levis,et al. CTP , 2013, ACM Trans. Sens. Networks.
[29] Arshad Jhumka,et al. A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[30] Ke Xu,et al. An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.
[31] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[32] JeongGil Ko,et al. Industry: beyond interoperability: pushing the performance of sensor network IP stacks , 2011, SenSys.
[33] Arshad Jhumka,et al. Understanding source location privacy protocols in sensor networks via perturbation of time series , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[34] JhumkaArshad,et al. Fake source-based source location privacy in wireless sensor networks , 2015 .
[35] Javier López,et al. Location Privacy in WSNs: Solutions, Challenges, and Future Trends , 2013, FOSAD.
[36] Mianxiong Dong,et al. Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[37] Anis Koubaa,et al. Radio link quality estimation in wireless sensor networks , 2012, ACM Trans. Sens. Networks.
[38] Jie Wu,et al. Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[39] Petros Spachos,et al. Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).
[40] Weijia Jia,et al. A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.
[41] Liang Chen,et al. A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, International Conference on Intelligent Cloud Computing.
[42] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[43] Hongwei Zhang,et al. Reliable bursty convergecast in wireless sensor networks , 2005, MobiHoc '05.
[44] Xu Chen,et al. A Novel Source-Location Anonymity Protocol in Surveillance Systems , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).
[45] Yunhao Liu,et al. End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[46] Honglong Chen,et al. On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..
[47] Prabhat Kumar,et al. Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks , 2015 .
[48] Heejo Lee,et al. Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.
[49] Chin-Tser Huang,et al. PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers , 2013, 2013 Proceedings IEEE INFOCOM.
[50] Hongwei Zhang,et al. Reliable bursty convergecast in wireless sensor networks , 2007, Comput. Commun..
[51] Yik-Chung Wu,et al. Clock Synchronization of Wireless Sensor Networks , 2011, IEEE Signal Processing Magazine.
[52] Miao Xu,et al. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.
[53] Paolo Palmieri. Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks , 2015, ICICS.
[54] Mianxiong Dong,et al. Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.
[55] Ling Li,et al. Random selection false source-based algorithm for protecting source-location privacy in WSNs , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).
[56] Arshad Jhumka,et al. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks , 2015, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC).
[57] Arshad Jhumka,et al. Fake source‐based source location privacy in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[58] M. P. Singh,et al. Source location privacy using multiple-phantom nodes in WSN , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.