参考文献
[1] Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(4): 393-422.
[2] 任丰原, 黄海宁, 林 闯. 无线传感器网络[J]. 软件学报, 2003, 14(7): 1282-1291.
[3] Ozturk C, Zhang Yangyong, Trappe W. Source-location Privacy in Energy-constrained Sensor Network Routing[C]// Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. Washington D. C., USA: [s. n.], 2004: 88- 93.
[4] Kamat P, Zhang Yanyong, Trappe W, et al. Enhancing Source- location Privacy in Sensor Network Routing[C]//Proc. of the 25th IEEE International Conference on Distributed Computing Systems. Columbus, USA: IEEE Press, 2005: 599-608.
[5] Zhang Liang. A Self-adjusting Directed Random Walk Approach for Enhancing Source-location Privacy in Sensor Network Routing[C]//Proc. of International Conference on Wireless Communications and Mobile Computing. New York, USA: ACM Press, 2006: 33-38.
[6] Yong Xi, Schwiebert L, Shi Weisong. Preserving Source Loca- tion Privacy in Monitoring-based Wireless Sensor Networks[C]// Proc. of the 20th International Parallel and Distributed Processing Symposium. Rhodes Island, Greece: IEEE Press, 2006: 1-9.
[7] Yao Jianbo, Wen Guangjun. Preserving Source-location Privacy in Energy-constrained Wireless Sensor Networks[C]// Proc. of IEEE Distributed Computing Systems Workshops. Beijing, China: [s. n.], 2008: 412-416.
[8] 陈 娟, 方滨兴, 殷丽华, 等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010, 33(9): 1736-1747.
[9] Wang Weiping, Chen Liang, Wang Jianxin. A Source-location Privacy Protocol in WSN Based on Locational Angle[C]//Proc. of IEEE International Conference on Communications. Beijing, China: [s. n.], 2008: 1630-1634.
[10] 苏 申. 无线传感器网络基于幻象路由的源位置隐私保护策略研究[D]. 哈尔滨: 哈尔滨工业大学, 2010.
[11] Mahmoud M E, Mahmoud A, Shen Xuemin. A Cloud-based Scheme for Protecting Source Location Privacy Against Hotspot-locating Attack in Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed System, 2012, 23(10): 1805-1818.
[12] 叶阿勇, 马建峰, 裴庆祺, 等. 无线传感器网络节点定位安全研究进展[J]. 通信学报, 2009, 30(10A): 74-84.
[13] Sheng Zhong, Jadliwala M, Upadhyaya S, et al. Towards a Theory of Robust Localization Against Malicious Beacon Nodes[C]//Proc. of the 27th Conference on Computer Communications. Phoenix, UK: IEEE Press, 2008: 1391-1399.
编辑 任吉慧 |