메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Preserving source-location privacy in wireless sensor network using STaR routing

Author keywords

[No Author keywords available]

Indexed keywords

LOCATION; POWER MANAGEMENT (TELECOMMUNICATION); ROUTING PROTOCOLS; SENSOR NODES; STARS;

EID: 79551649009     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2010.5683603     Document Type: Conference Paper
Times cited : (34)

References (25)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, February 1981.
    • (1981) Communications of the ACM , vol.24
    • Chaum, D.1
  • 2
    • 0023861309 scopus 로고
    • The dinning cryptographer problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dinning cryptographer problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 33847297141 scopus 로고    scopus 로고
    • Countermeasures against traffic analysis attacks in wireless sensor networks
    • Sept.
    • J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," SecureComm 2005, pp. 113-126, Sept. 2005.
    • (2005) SecureComm 2005 , pp. 113-126
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 8
    • 55149095912 scopus 로고    scopus 로고
    • A novel scheme for protecting receiver's location privacy in wireless sensor networks
    • October
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 7, pp. 3769-3779, October 2008.
    • (2008) Wireless Communications, IEEE Transactions on , vol.7 , pp. 3769-3779
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 12
    • 33847141964 scopus 로고    scopus 로고
    • Preserving source location privacy in monitoring-based wireless sensor networks
    • IEEE
    • Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks.," in IPDPS, IEEE, 2006.
    • (2006) IPDPS
    • Xi, Y.1    Schwiebert, L.2    Shi, W.3
  • 14
    • 85164891669 scopus 로고    scopus 로고
    • http://www.panda.org/.
  • 15
    • 28444435923 scopus 로고    scopus 로고
    • Eecs: An energy efficient clustering scheme in wireless sensor networks
    • April
    • M. Ye, C. Li, G. Chen, and J. Wu, "Eecs: an energy efficient clustering scheme in wireless sensor networks," IPCCC 2005, pp. 535-540, April 2005.
    • (2005) IPCCC 2005 , pp. 535-540
    • Ye, M.1    Li, C.2    Chen, G.3    Wu, J.4
  • 18
    • 10944266504 scopus 로고    scopus 로고
    • Heed: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
    • Oct.-Dec.
    • O. Younis and S. Fahmy, "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," Mobile Computing, IEEE Transactions on, vol. 3, pp. 366-379, Oct.-Dec. 2004.
    • (2004) Mobile Computing, IEEE Transactions on , vol.3 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 19
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • April
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 829-835, April 2006.
    • (2006) Selected Areas in Communications, IEEE Journal on , vol.24 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.