共 20 条
- [1] Shao M., Zhu S., Zhang W., Cao G., pDCS: Security and privacy support for data-centric sensor networks, Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 1298-1306, (2007)
- [2] Joseph M., Choudhury R.R., Hiding stars with fireworks location privacy through camouflage, Proceedings of the ACM Special Interest Group on Mobility of Systems, Users, Data and Computing (SIGMOBILE), pp. 345-356, (2009)
- [3] Hoh B., Gruteser M., Xiong H., Alrabady A., Enhancing security and privacy in traffic-monitoring systems, IEEE Pervasive Computing, 5, 4, pp. 38-46, (2006)
- [4] Chen X.Q., Makki K., Yen K., Sensor network security: A survey, IEEE Communications Surveys and Tutorials, 11, 2, pp. 52-73, (2009)
- [5] Ozturk C., Zhang Y., Trappe W., Source-location privacy in energy constrained sensor networks routing, Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN), pp. 88-93, (2004)
- [6] Kamat P., Zhang Y., Trappe W., Ozturk C., Enhancing source-location privacy in sensor network routing, Proceedings of the 25th International Conference on Distributed Computing Systems(ICDCS), pp. 599-608, (2005)
- [7] Wang W.P., Chen L., Wang J.X., A source-location privacy protocol in WSN based on locational angle, Proceedings of the IEEE International Conference on Communications (ICC), pp. 1630-1634, (2008)
- [8] Kang L., Protecting location privacy in large-scale wireless sensor networks, Proceedings of the IEEE International Conference on Communications(ICC), (2009)
- [9] Mehta K., Liu D., Wright M., Location privacy in sensor networks against a global eavesdropper, Proceedings of the IEEE International Conference on Network Protocols(ICNP), pp. 314-323, (2007)
- [10] Yang Y., Shao M., Zhu S., Urgaonkar B., Cao G., Towards event source unobservability with minimum network traffic in sensor networks, Proceedings of the ACM Conference on Wireless Network Security(WiSec), pp. 77-88, (2008)