[1] QIU T, QIAO R X, WU D P.EABS:an event-aware backpressure scheduling scheme for emergency internet of things[J]. IEEE Transactions on Mobile Computing, 2017, 17(1): 1-14. [2] JIANG J F, HAN G J, WANG H, et al. A survey on location privacy protection in wireless sensor networks[J]. Journal of Network and Computer Applications, 2019, 125:93-114. [3] DENG J, HAN R, MISHRA S.Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]//Proceedings of 2004 International Conference on Dependable Systems and Networks.Florence, Italy:[s.n.], 2004:508-520. [4] DENG J, HAN R, MISHRA S.Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks[J]. Pervasive and Mobile Computing, 2005, 2(2): 159-186. [5] CHEN J, LIN Z, LIU Y, et al. Sink location protection protocols based on packet sending rate adjustment[J]. International Journal of Distributed Sensor Networks, 2016, 12(1): 1-10. [6] LIU A F, LIU X, TANG Z P, et al. Preserving smart sink-location privacy with delay guaranteed routing scheme for WSN[J]. ACM Transactions on Embedded Computing Systems, 2017, 16(3): 1-25. [7] BAROUTIS N, YOUNIS M.Load-conscious maximization of base-station location privacy in wireless sensor networks[J]. Computer Networks, 2017, 124:126-139. [8] YING J, CHEN S, ZHANG Z, et al. A novel scheme for protecting receiver's location privacy in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2008, 7(10): 3769-3779. [9] YAO L, KANG L, SHANG P F, et al. Protecting the sink location privacy in wireless sensor networks[J]. Personal and Ubiquitous Computing, 2013, 17(5): 883-893. [10] LONG J, LIU A F, Dong M X, et al. An energy-efficient and sink-location privacy enhanced scheme for WSN through ring based routing[J]. Journal of Parallel and Distributed Computing, 2015, 81:47-65. [11] WANG J, WANG F Y, CAO Z Z, et al. Sink location privacy protection under direction attack in wireless sensor networks[J]. Wireless Networks, 2017, 23(2): 579-591. [12] BANGASH Y A, ZENG L F, FENG D.MimiBS:mimicking base-station to provide location privacy protection in wireless sensor networks[J]. Journal of Computer Science and Technology, 2017, 32(5): 991-1007. [13] KUMAR N, DASH D.Flow based efficient data gathering in wireless sensor network using path-constrained mobile sink[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11(3): 1163-1175. [14] HAN G J, ZHOU L N, WANG H, et al. A source location protection protocol based on dynamic routing in WSNs for the social Internet of Things[J]. Future Generation Computer Systems, 2018, 82:689-697. [15] MUTALEMWA L C, SHIN S.Secure routing protocols for source node privacy protection in multi-hop communication wireless networks[J]. Sensors, 2020, 13(2): 1-30. [16] 周倩, 秦小麟, 丁有伟.基于攻击感知的能量高效源位置隐私保护算法[J]. 通信学报, 2018, 39(1): 101-116. ZHOU Q, QIN X L, DING Y W.Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications, 2018, 39(1): 101-116.(in Chinese) [17] MUTALEMWA L C, SHIN S.Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing[J]. Sensors, 2019, 19(5): 1-19. [18] 冯秀芳, 吕淑芳.基于RSSI和分步粒子群算法的无线传感器网络定位算法[J]. 控制与决策, 2014, 29(11): 1966-1972. FENG X F, LÜ S F.Wireless sensor networks location algorithm based on RSSI and split-step particle swarm optimization algorithm[J]. Control and Decision, 2014, 29(11): 1966-1972.(in Chinese) [19] 刘敬坡, 刘朝晖, 丁琳.基于距离和节点能量的源位置隐私保护方案[J]. 计算机技术与发展, 2020, 30(2): 121-126, 120. LIU J P, LIU Z H, DING L.A source-location privacy protection scheme based on distance and node energy[J]. Computer Technology and Development, 2020, 30(2): 121-126, 120.(in Chinese) [20] 张鹏, 马小南.基于路由协议的无线传感器网络源位置隐私保护探究[J]. 湘潭大学自然科学学报, 2014, 36(1): 110-114. ZHANG P, MA X N.Research of the networks source location privacy protection of wireless sensor based on routing Protocols[J]. Natural Science Journal of Xiangtan University, 2014, 36(1): 110-114.(in Chinese) |