[1]潘巨龙,李善平,张道远. 无线医疗传感器网络中基于Feistel加密算法研究[J]. 传感技术学报, 2010,23(7):1030-1036.
[2]裴庆祺,沈玉龙,马建峰. 无线传感器网络安全技术综述[J]. 通信学报, 2007,28(8):113-122.
[3]彭辉,陈红,张晓莹,等. 无线传感器网络位置隐私保护技术[J]. 软件学报, 2015,26(3):617-639.
[4]范永健,陈红,张晓莹. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012,35(6):1131-1146.
[5]Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-constrained sensor network routing[C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2004:88-93.
[6]Kamat P, Zhang Yanyong, Trappe W, et al. Enhancing sourcelocation privacy in sensor network routing[C]// The 25th IEEE International Conference on Distributed Computing Systems (I-CDCS’05). 2005:599-608.
[7]Lightfoot L, Li Yun, Ren Jian. Preserving source-location privacy in wireless sensor network using STaR routing[C]// 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010). 2010:1-5.
[8]Kang Lei. Protecting location privacy in large-scale wireless sensor networks[C]// Proceedings of the 2009 IEEE International Conference on Communications. 2009:603-608.
[9]Shaikh R A, Jameel H, dAuriol B J, et al. Network level privacy for wireless sensor networks[C]// The 4th IEEE International Conference on Information Assurance and Security. 2008:261-266.
[10]Wang Wei-ping, Chen Liang, Wang Jian-xin. A source-location privacy protocol in WSN based on locational angle[C]// 2008 IEEE International Conference on Communications. 2008:1630-1634.
[11]陈娟,方滨兴,殷丽华,等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010(9):1736-1747.
[12]Huang Jun, Sun Meisong, Zhu Shitong, et al. A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs[C]// Proceedings of the 30th Annual ACM Symposium on Applied Computing.
2015:688-694.
[13]姚剑波,郝晓青,文光俊. 无线传感器网络中的位置隐私保护[J]. 传感技术学报, 2008,21(8):1437-1441.
[14]Tan Guangbao, Li Wei, Song Jie. Enhancing source location privacy in energy-constrained wireless sensor networks[C]// Proceedings of International Conference on Computer Science and Information Technology. 2014:279-289.
[15]刘学军,李江,李斌. 基于最小能耗路由的源节点位置隐私保护协议[J]. 传感技术学报, 2014,27(3):394-400.
[16]Kumar P, Singh J P, Vishnoi P, et al. Source location privacy using multiple-phantom nodes in WSN[C]// TENCON 2015-2015 IEEE Region 10 Conference. 2015:1-6.
[17]Gupta S, Kumar P, Singh J P, et al. Privacy Preservation of Source Location Using Phantom Nodes[M]// Information Technology: New Generations, 2016:247-256. |