메뉴 건너뛰기




Volumn 7, Issue 10, 2008, Pages 3769-3779

A novel scheme for protecting receiver's location privacy in wireless sensor networks

Author keywords

Location privacy; Sensor networks

Indexed keywords

BEHAVIOR PATTERNS; COUNTER-MEASURES; DEFENSE SYSTEMS; DELIVERY TIMES; ENERGY COSTS; LOCATION PRIVACIES; LOCATION PRIVACY; NOVEL SCHEMES; PACKET INJECTIONS; PATH DIVERSITIES; PRIVACY PROTECTIONS; SENSOR NODES; SIMULATION RESULTS; SYSTEM PARAMETERS; TRAFFIC DIRECTIONS; UNIFORMLY DISTRIBUTED;

EID: 55149095912     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/T-WC.2008.070182     Document Type: Article
Times cited : (66)

References (20)
  • 5
  • 11
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • May
    • M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
    • (1998) IEEE J. Select. Areas Commun , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 12
    • 33748622050 scopus 로고    scopus 로고
    • Mask: Anonymous on-demand routing in mobile ad hoc networks
    • Sept
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Mask: anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
    • (2006) IEEE Trans. Wireless Commun , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 19
    • 0035865898 scopus 로고    scopus 로고
    • Flooding in wireless ad hoc networks
    • H. Lim and C.Kim, "Flooding in wireless ad hoc networks," Computer Commun. J., vol. 24(3-4), pp. 353-363, 2001.
    • (2001) Computer Commun. J , vol.24 , Issue.3-4 , pp. 353-363
    • Lim, H.1    Kim, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.