-
1
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, pp. 88–93 (2004)
-
(2004)
Proceedings of the 2Nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
2
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)
-
(2005)
Proceedings of 25Th IEEE International Conference on Distributed Computing Systems (ICDCS 2005)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
3
-
-
4544367290
-
Source-location privacy for networks of energyconstrained sensors
-
Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energyconstrained sensors. In: Proceedings of Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 68–72 (2004)
-
(2004)
Proceedings of Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems
, pp. 68-72
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
Ott, M.4
-
4
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols (ICNP 2007), pp. 314–323 (2007)
-
(2007)
IEEE International Conference on Network Protocols (ICNP 2007)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
5
-
-
51249113844
-
A source-location privacy protocol in WSN based on locational angle
-
Wei-ping, W., Liang, C., Jian-xin, W.: A source-location privacy protocol in WSN based on locational angle. In: IEEE International Conference on Communications (ICC’08), pp. 1630–1634 (2008)
-
(2008)
IEEE International Conference on Communications (ICC’08)
, pp. 1630-1634
-
-
Wei-Ping, W.1
Liang, C.2
Jian-Xin, W.3
-
6
-
-
79960126298
-
An experimental comparison of source location privacy methods for power optimization in WSNs
-
Suarez-Tangil, G., Palomar, E., Ramos, B., Ribagorda, A.: An experimental comparison of source location privacy methods for power optimization in WSNs. In: Proceedings of the 3rd WSEAS International Conference on Advances in Sensors, Signals and Materials, pp. 79–84 (2010)
-
(2010)
Proceedings of the 3Rd WSEAS International Conference on Advances in Sensors, Signals and Materials
, pp. 79-84
-
-
Suarez-Tangil, G.1
Palomar, E.2
Ramos, B.3
Ribagorda, A.4
-
7
-
-
79551649009
-
Preserving source-location privacy in wireless sensor network using STaR routing
-
Lightfoot, L., Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor network using STaR routing. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5 (2010)
-
(2010)
IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-5
-
-
Lightfoot, L.1
Li, Y.2
Ren, J.3
-
8
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Comput. Netw. 53, 1512–1529 (2009)
-
(2009)
Comput. Netw
, vol.53
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
10
-
-
80052734065
-
Improving source-location privacy through opportunistic routing in wireless sensor networks
-
Spachos, P., Song, L., Bui, F.M., Hatzinakos, D.: Improving source-location privacy through opportunistic routing in wireless sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 815–820 (2011)
-
(2011)
2011 IEEE Symposium on Computers and Communications (ISCC)
, pp. 815-820
-
-
Spachos, P.1
Song, L.2
Bui, F.M.3
Hatzinakos, D.4
-
11
-
-
84862961257
-
Using data mules to preserve source location privacy in wireless sensor networks
-
Springer
-
Li, N., Raj, M., Liu, D., Wright, M., Das, S.K.: Using data mules to preserve source location privacy in wireless sensor networks. In: Distributed Computing and Networking, pp. 309–324. Springer (2012)
-
(2012)
Distributed Computing and Networking,
, pp. 309-324
-
-
Li, N.1
Raj, M.2
Liu, D.3
Wright, M.4
Das, S.K.5
-
13
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., La Porta, T.: Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Trans. Mobile Comput. 6, 663–677 (2007)
-
(2007)
IEEE Trans. Mobile Comput
, vol.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
|