-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Mar
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393-422, Mar. 2002
-
(2002)
Comput. Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
(SenSys04), New York, NY, USA Nov
-
C. Karlof, N. Sastry, and D.Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst. (SenSys04), New York, NY, USA, Nov. 2004, pp. 162-175
-
(2004)
Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
3
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
Jun
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks," in Proc. Int. Conf. Depend. Syst. Netw. (DSN04), Florence, Italy, Jun. 2004, pp. 637-646
-
(2004)
Proc. Int. Conf. Depend. Syst. Netw. (DSN04), Florence, Italy
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
4
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
SecureComm05), Athens, Greece
-
J. Deng, R. Han, and S.Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," in Proc. 1st IEEE Conf. Security Privacy Emerg. Areas Commun. Netw. (SecureComm05), Athens, Greece, 2005, pp. 113-126
-
(2005)
Proc. 1st IEEE Conf. Security Privacy Emerg. Areas Commun. Netw
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
84897001610
-
-
[Online]. Available
-
- (2005). The Free Haven project [Online]. Available: http://freehaven. net/anonbib/date.html
-
(2005)
The Free Haven Project
-
-
-
6
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
Feb
-
D. Chaum, "Untraceable electronic mail, return address, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, AK, USA, May
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," in Proc. 1st IEEE Int. Workshop Sensor Netw. Protocols Appl., Anchorage, AK, USA, May 2003, pp. 113-127
-
(2003)
Proc. 1st IEEE Int. Workshop Sensor Netw. Protocols Appl
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
84871814015
-
Toward a statistical framework for source anonymity in sensor networks
-
Feb
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Toward a statistical framework for source anonymity in sensor networks," IEEE Trans. Mobile Comput., vol. 12, no. 2, pp. 248-260, Feb. 2013
-
(2013)
IEEE Trans. Mobile Comput
, vol.12
, Issue.2
, pp. 248-260
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
9
-
-
14844303406
-
Source-location privacy in energyconstrained sensor network routing
-
Washington, DC, USA, Oct
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energyconstrained sensor network routing," in Proc. 2nd ACM Workshop Security Adhoc Sensor Netw. (SASN04), Washington, DC, USA, Oct. 2004, pp. 88-93
-
(2004)
Proc. 2nd ACM Workshop Security Adhoc Sensor Netw. (SASN04
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
10
-
-
77953302309
-
Source-location privacy through dynamic routing in wireless sensor networks
-
San Diego, CA, USA, Mar
-
Y. Li and J. Ren, "Source-location privacy through dynamic routing in wireless sensor networks," in Proc. 29th IEEE Int. Conf. Comput. Commun. (INFOCOM10), San Diego, CA, USA, Mar. 2010, pp. 1-9
-
(2010)
Proc. 29th IEEE Int. Conf. Comput. Commun. (INFOCOM10
, pp. 1-9
-
-
Li, Y.1
Ren, J.2
-
11
-
-
84880892668
-
Cluster based anonymization for source location privacy in wireless sensor network
-
Gwalior, India, Apr
-
A. Gurjar and A. R. B. Patil, "Cluster based anonymization for source location privacy in wireless sensor network," in Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT13), Gwalior, India, Apr. 2013, pp. 248-251
-
(2013)
Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT13
, pp. 248-251
-
-
Gurjar, A.1
Patil, A.R.B.2
-
12
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
Columbus, OH, USA Jun
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," in Proc. 25th Int. Conf. Distrib. Comput. Syst. (ICDCS05), Columbus, OH, USA, Jun. 2005, pp. 599-608
-
(2005)
Proc. 25th Int. Conf. Distrib. Comput. Syst. (ICDCS05
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
13
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Apr
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks," in Proc. 20th Int. Parallel Distrib. Process. Symp. (IPDPS06), Rhodes Island, Greece, Apr. 2006, pp. 162-169
-
(2006)
Proc. 20th Int. Parallel Distrib. Process. Symp. (IPDPS06), Rhodes Island, Greece
, pp. 162-169
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
14
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Beijing, China, Oct
-
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. IEEE Int. Conf. Netw. Protocols (ICNP07), Beijing, China, Oct. 2007, pp. 314-323
-
(2007)
Proc. IEEE Int. Conf. Netw. Protocols (ICNP07
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
15
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
Phoenix, AZ, USA, Apr
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. 27th IEEE Int. Conf. Comput. Commun. (INFOCOM08), Phoenix, AZ, USA, Apr. 2008, pp. 51-59
-
(2008)
Proc. 27th IEEE Int. Conf. Comput. Commun. (INFOCOM08
, pp. 51-59
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
16
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
New York, NY, USA, Mar
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proc. 1st ACM Conf. Wireless Netw. Security (WiSec08), New York, NY, USA, Mar. 2008, pp. 77-88
-
(2008)
Proc. 1st ACM Conf. Wireless Netw. Security (WiSec08
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
17
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
Jun
-
H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Comput. Netw., vol. 53, no. 9, pp. 1512-1529, Jun. 2009
-
(2009)
Comput. Netw
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
18
-
-
79960880538
-
Maintaining source privacy under eavesdropping and node compromise attacks
-
Shanghai, China, Apr
-
K. Pongaliur and L. Xiao, "Maintaining source privacy under eavesdropping and node compromise attacks," in Proc. 30th IEEE Int. Conf. Comput. Commun. (INFOCOM11), Shanghai, China, Apr. 2011, pp. 1656-1664
-
(2011)
Proc. 30th IEEE Int. Conf. Comput. Commun. (INFOCOM11
, pp. 1656-1664
-
-
Pongaliur, K.1
Xiao, L.2
-
19
-
-
33845942290
-
Entrapping adversaries for source protection in sensor networks
-
(WoWMoM06), Buffalo-Niagara Falls, NY, USA, Jun
-
Y. Ouyang, Z. Le, G. Chen, J. Ford, and F Makedon, "Entrapping adversaries for source protection in sensor networks," in IEEE Int. Symp. World Wireless Mobile Multimedia Netw. (WoWMoM06), Buffalo-Niagara Falls, NY, USA, Jun. 2006, pp. 25-34
-
(2006)
IEEE Int. Symp. World Wireless Mobile Multimedia Netw
, pp. 25-34
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
-
20
-
-
84555189295
-
Protecting location privacy in sensor networks against a global eavesdropper
-
Feb
-
K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Comput., vol. 11, no. 2, pp. 320-336, Feb. 2011
-
(2011)
IEEE Trans. Mobile Comput
, vol.11
, Issue.2
, pp. 320-336
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
21
-
-
84883074480
-
Passages: Preserving anonymity of sources and sinks against global eavesdroppers
-
Turin, Italy, Apr
-
H. Park, S. Song, B. Y. Choi, and C. T. Huang, "PASSAGES: Preserving anonymity of sources and sinks against global eavesdroppers," in Proc. 32th IEEE Int. Conf. Comput. Commun. (INFOCOM13), Turin, Italy, Apr. 2013, pp. 210-214
-
(2013)
Proc. 32th IEEE Int. Conf. Comput. Commun. (INFOCOM13
, pp. 210-214
-
-
Park, H.1
Song, S.2
Choi, B.Y.3
Huang, C.T.4
-
22
-
-
84874443482
-
Sensor source location privacy based on random perturbations
-
Appl. Worksharing (CollaborateCom12), Pittsburgh, PA, USA, Oct
-
U. Srimongkolpitak and Y. Yang, "Sensor source location privacy based on random perturbations," in Proc. 8th Int. Conf. Collab. Comput. Netw., Appl. Worksharing (CollaborateCom12), Pittsburgh, PA, USA, Oct. 2012, pp. 500-507
-
(2012)
Proc. 8th Int. Conf. Collab. Comput. Netw
, pp. 500-507
-
-
Srimongkolpitak, U.1
Yang, Y.2
-
23
-
-
51249113844
-
A source-location privacy protocol in WSN based on locational angle
-
Beijing, China, May
-
W. Wang, L. Chen, and J. Wang, "A source-location privacy protocol in WSN based on locational angle," in Proc. IEEE Int. Conf. Commun. (ICC08), Beijing, China, May 2008, pp. 1630-1634
-
(2008)
Proc. IEEE Int. Conf. Commun. (ICC08
, pp. 1630-1634
-
-
Wang, W.1
Chen, L.2
Wang, J.3
|