[1] Kamat P, Zhang Y, Trappe W, et al. Enhancing source-location privacy in sensor network routing[C]// Proceedings-25th IEEE International Conference on Distributed Computing Systems, Columbus, OH, USA. USA: IEEE, 2005: 599-608. [2] Yao J, Wen G.Preserving source-location privacy in energy-constrained wireless sensor network[C]// Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China. Beijing, China, Institute of Electrical and Electronics Engineers Inc, 2008: 412-416. [3] Chen R, Yu C, Wu T.A Small-World Routing Protocol and the Effect of Pass-Over for Wireless Sensor Networks[J]. Wireless Personal Communications (S09296212), 2013, 68(4): 1493-1523. [4] Zungeru A, Seng K, Ang L.Energy Efficiency Performance Improvements for Ant-Based Routing Algorithm in Wireless Sensor Networks[J]. Journal of Sensors (S1687725X), 2013(4):572-575. [5] Intanagonwiwat C, Govindan R, Estrin D.Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks[C]// Proc. ACM MobiCom, 2000, Boston, MA, USA. USA: ACM, 2000: 56-67. [6] Jian Y, Chen S, Zhang Z, et al. A Novel Scheme for Protecting Receiver's Location Privacy in Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications (S15361276), 2008, 7(10): 3769-3779. [7] Jian Y, Chen S, Zhang Z, Zhang L.Protecting Receiver-Location Privacy in Wireless Sensor Networks[C]// IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications, Anchorage, Anchorage, AK, USA. USA: IEEE, 2007: 1955-1963. [8] Kiran M, Liu D, Matthew W.Location privacy in sensor network against a global eavesdropper[C]// 15th IEEE International Conference on Network Protocols, ICNP, China. USA: IEEE, 2007: 314-323. [9] William C, Abdelzaher T, Nahrstedt K.Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks[C]// 2nd IEEE International Conference - Distributed Computing in Sensor Systems, DCOSS 2006, San Francisco, CA, USA. USA: IEEE, 2006: 202-217. [10] Chiu W, Chen B, Yang C.Robust relative location estimation in wireless sensor networks with inexact position problems[J]. IEEE Transactions on Mobile Computing (S15361233), 2012, 11(6): 935-946. [11] Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam. L- diversity: Privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD)(S1556-4681), 2007, 1(3): 24-35. [12] Marco G, Grunwald D.Anonymous usage of location-based and services through spatial and temporal cloaking[C]// Processing of the International Conference on Mobil e Systems, Applicat MobiSys. San Francisco, California, USA: International Conference on Mobile Systems, 2003: 163-168. [13] Han JQ, Zhao W, Zheng M.An analytical model on unbalanced energy consumption in large scale wireless sensor network[C]// The 3rd International Conference on Measuring Technology and Mechatronics Automation, Shanghai, China. USA: IEEE, 2011: 375-378. [14] Li FY, Li PY, Gao FX, et al. Location privacy protection for wireless sensor networks based on fan-shaped region[J]. Journal of Northeastern University (S10053026), 2013, 34(1): 21-24, 34. |