[1] 范永健,陈红,张晓莹. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012,35(6):1131-1146.
[2] Kamat P, Xu Wenyuan, Trappe W, et al. Temporal privacy in wireless sensor networks: Theory and practice[J]. ACM Transactions on Sensor Networks, 2009,5(4): Article 28.
[3] Hong Xiaoyan, Wang Pu, Kong Jiejun, et al. Effective probabilistic approach protecting sensor traffic[C]// Proceedings of the 2005 IEEE Military Communications Conference (MILCOM). 2005,1:169-175.
[4] Shafiei H, Khonsari A, Derakhshi H, et al. Rate-privacy in wireless sensor networks[C]// Proceedings of the 2013 IEEE Conference on Computer Communications Workshops. 2013:67-68.
[5] Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981,24(2):85-88.
[6] Kamat P, Zhang Yanyong, Trappe W, et al. Enhancing source-location privacy in sensor network routing[C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. 2005:599-608.
[7] Szewczyk R, Mainwaring A, Polastre J, et al. An analysis of a large scale habitat monitoring application[C]// Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. 2004:214-226.
[8] Ozturk C, Zhang Yanyong, Trappe W. Source-location privacy in energy-constrained sensor network routing[C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2004:88-93.
[9] Deng Jing, Han R, Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]// Proceedings of the 2004 IEEE International Conference on Dependable Systems and Networks (DSN). 2004:637-646.
[10] Deng Jing, Han R, Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks[C]// Proceedings of the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks. 2005:113-126.
[11] Hill J, Szewczyk R, Woo A, et al. System architecture directions for network sensors[C]// Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems. 2000:93-104.
[12] Madden S, Franklin M, Hellerstein J, et al. TAG: A tiny aggregation service for ad-hoc sensor networks[C]// Proceedings of the 5th Symposium on Operating Systems Design and Implementation. 2002:131-146.
[13] Chan Haowen, Perrig A, Song D. Random key predistribution schemes for sensor networks[C]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. 2003:197-213.
[14] Du Wenliang, Deng Jing, Han Y, et al. A pairwise key predistribution scheme for wireless sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003:42-51.
[15] Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002:41-47.
[16] Liu Donggang, Ning Peng. Establishing pairwise keys in distributed sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003:52-61.
[17] Berthold O, Federrath H, Kohntopp M. Project anonymity and unobservability in the Internet[C]// Proceedings of the 2000 Conference on Computers Freedom and Privacy. 2000:57-65. |