Author:
Li Shuming,Xiao Yan,Lin Qiaomin,Qi Zhuzhu
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Hu R H, Dong X M, Wang D L. Protecting data source location privacy in wireless sensor networks against a global eavesdropper[EB/OL].[2014-08-13]. http: //downloads. hindawi. com/journals/ijdsn/2014/492802.pdf.
2. Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-constrained sensor network routing [C] // Proc 2nd ACM Work-shop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004: 88–93.
3. Braginsky D, Estrin D. Rumor routing algorithm for sensor networks [C] // Proc 1st ACM International Workshop on Wireless Sensor Networks and Applications. New York: ACM Press, 2002: 22–31.
4. Li Y, Ren J. Providing source-location privacy in wireless sensor networks [C] // Proc International Conference on Wireless Algorithms, Systems and Applications. Berlin: Springer-Verlag, 2009: 338–347.
5. Li Y, Lightfoot L, Ren J. Routing-based source-location privacy protection in wireless sensor networks [C] // Proc IEEE International Conference on Electro/Information Technology. Piscataway: IEEE Press, 2009: 29–34.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献