[1]Akyildiz I F, Su Weilian, Sankarasubramaniam Y, et al. Wireless sensor networks: A survey[J]. Computer Networks, 2002,38(4):393-422.
[2]Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008,52(12):2292-2330.
[3]Kamat P, Zhang Yanyong, Trappe W, et al. Enhancing source-location privacy in sensor network routing[C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. 2005:599-608.
[4]Perrig A, Szewczyk R, Tygar J D, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002,8(5):521-534.
[5]Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002:41-47.
[6]Zhu Sencun, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks[J]. ACM Transactions on Sensor Networks, 2006,2(4):500-528.
[7]Li Yun, Ren Jian. Source-location privacy through dynamic routing in wireless sensor networks[C]// Proceedings of the 29th Conference on Information Communications. 2010:2660-2668.
[8]Wang Haodong, Sheng Bo, Li Qun. Privacy-aware routing in sensor networks[J]. Computer Networks, 2009,53(9):1512-1529.
[9]Huang Jun, Sun Meisong, Zhu Shitong, et al. A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs[C]// Proceedings of the 30th Annual ACM Symposium on Applied Computing. 2015:688-694.
[10]Lightfoot L, Li Yun, Ren Jian. Preserving source-location privacy in wireless sensor network using STaR routing[C]// Proceedings of the 2010 IEEE Global Telecommunications Conference. 2010.
[11]贾宗璞,魏晓娟,彭维平. WSNs中基于随机角度和圆周路由的源位置隐私保护策略研究[J]. 计算机应用研究, 2016,33(3):886-890.
[12]Kumar P, Singh J P, Vishnoi P, et al. Source location privacy using multiple-phantom nodes in WSN[C]// Proceedings of the TENCON 2015. 2015.
[13]Gupta S, Kumar P, Singh J P, et al. Privacy preservation of source location using phantom nodes[M]// Information Technology: New Generations. Springer International Publishing, 2016:247-256.
[14]Long Jun, Dong Mianxiong, Ota K, et al. Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks[J]. IEEE Access, 2014,2:633-651.
[15]Dong Mianxiong, Ota K, Liu Anfeng. Preserving source-location privacy through redundant fog loop for wireless sensor networks[C]// Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. 2015:1835-1842.
[16]Ye Fan, Chen A, Lu Songwu, et al. A scalable solution to minimum cost forwarding in large sensor networks[C]// Proceedings of the 10th International Conference on Computer Communications and Networks. 2001:304-309.
[17]Lu Zongqing, Wen Yonggang. Credit routing for source-location privacy protection in wireless sensor networks[C]// Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems. 2012:164-172.
[18]刘学军,李江,李斌. 基于最小能耗路由的源节点位置隐私保护协议[J]. 传感技术学报, 2014,27(3):394-400.
[19]Wang Weiping, Chen Liang, Wang Jianxin. A source-location privacy protocol in WSN based on locational angle[C]// Proceedings of the 2008 IEEE International Conference on Communications. 2008:1630-1634.
[20]Mahmoud M M E A, Shen Xuemin. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(10):1805-1818.
[21]Lin Qiaomin, Yang Jinwen, Zhang Bin, et al. Distributed face recognition in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2014,10(5). DOI: 10.1155/2014/175864. |