TY - CHAP AU - Deng, J. AU - Han, R. AU - Mishra, S. PY - 2005 DA - 2005// TI - Countermeasures against traffic analysis attacks in wireless sensor networks BT - Proceedings of IEEE/Create Net International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) UR - https://doi.org/10.1109/SECURECOMM.2005.16 DO - 10.1109/SECURECOMM.2005.16 ID - Deng2005 ER - TY - CHAP AU - Ozturk, C. AU - Zhang, Y. AU - Trappe, W. PY - 2004 DA - 2004// TI - Source-location privacy in energy-constrained sensor network routing BT - Proceedings of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington D.C. USA ID - Ozturk2004 ER - TY - CHAP AU - Jian, Y. AU - Chen, S. AU - Zhang, Z. AU - Zhang, L. PY - 1955 DA - 1955// TI - Protecting receiver location privacy in wireless sensor networks BT - Proc. of IEEE Infocom 2007, Anchorage, Alaska, USA, 2007 ID - Jian1955 ER - TY - CHAP AU - Kamat, P. AU - Zhang, Y. AU - Trappe, W. AU - Ozturk, C. PY - 2005 DA - 2005// TI - Enhancing source location privacy in sensor network routing BT - Proc. of IEEE ICDCS, Columbus, Ohio, USA ID - Kamat2005 ER - TY - JOUR AU - Wu, X. AU - Liu, J. AU - Hong, X. AU - Bertino, E. PY - 2006 DA - 2006// TI - Achieving anonymity in mobile ad hoc networks using fuzzy position information: mobile Ad-hoc and sensor networks JO - Lect Notes Comput Sci VL - 4325 UR - https://doi.org/10.1007/11943952_39 DO - 10.1007/11943952_39 ID - Wu2006 ER - TY - BOOK AU - Gu, Q. AU - Chen, X. AU - Jiang, Z. AU - Wu, J. PY - 2009 DA - 2009// TI - Sink-anonymity mobility control in wireless sensor networks (IEEE International Conference on Wireless and Mobile Computing ID - Gu2009 ER - TY - BOOK AU - Shokri, R. AU - Nayyeri, A. AU - Yazdani, N. PY - 2007 DA - 2007// TI - P Papadimitratos Efficient and adjustable recipient anonymity in mobile ad hoc networks (IEEE International Conference on Mobile Ad hoc and Sensor Systems ID - Shokri2007 ER - TY - JOUR AU - Perrig, A. AU - Szewczyk, R. AU - Tygar, J. D. AU - Wen, V. AU - Culler, D. E. PY - 2002 DA - 2002// TI - Spins: security protocols for sensor networks JO - Wirel. Netw VL - 8 UR - https://doi.org/10.1023/A:1016598314198 DO - 10.1023/A:1016598314198 ID - Perrig2002 ER - TY - JOUR AU - Zhou, L. AU - Chao, H. -. C. PY - 2011 DA - 2011// TI - Multimedia traffic security architecture for internet of things JO - IEEE Netw VL - 25 UR - https://doi.org/10.1109/MNET.2011.5772059 DO - 10.1109/MNET.2011.5772059 ID - Zhou2011 ER - TY - JOUR AU - Han, G. AU - Jiang, J. AU - Shen, W. AU - Shu, L. AU - Rodrigues, J. PY - 2013 DA - 2013// TI - IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks JO - IET Information Security, Institution of Engineering and Technology (IET) VL - 7 UR - https://doi.org/10.1049/iet-ifs.2012.0052 DO - 10.1049/iet-ifs.2012.0052 ID - Han2013 ER - TY - CHAP AU - Gedic, B. AU - Liu, L. PY - 2005 DA - 2005// TI - Location privacy in mobile system: a personalized anonymization model BT - Proc. of 25th IEEE International Conference on Distributed Computing Systems, Columbus, OH, USA ID - Gedic2005 ER - TY - CHAP AU - Bamba, B. AU - Liu, L. AU - Pesti, P. AU - Wang, T. PY - 2008 DA - 2008// TI - Supporting anonymous location queries in mobile environments with privacy grid BT - Int'l Conf. World Wide Web WWW'08 ID - Bamba2008 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - K-anonymity: a model for protecting privacy JO - International Journal on Uncertainty, Fuzziness and Knowledge-based Systems VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER - TY - CHAP AU - Yang, Y. AU - Shao, M. AU - Zhu, S. AU - Urgaonkar, B. AU - Cao, G. PY - 2008 DA - 2008// TI - Towards event source unobservability with minimum network traffic in sensor networks BT - Proc. of ACM WiSec, Alexandria, Virginia, USA ID - Yang2008 ER - TY - BOOK AU - Xi, Y. AU - Schwiebert, L. AU - Shi, W. PY - 2006 DA - 2006// TI - Preserving source location privacy in monitoring-based wireless sensor networks, in 20th International Conference on Parallel and Distributed Processing Symposium ID - Xi2006 ER - TY - JOUR AU - Li, Y. AU - Ren, J. AU - Wu, J. PY - 2012 DA - 2012// TI - Quantitative measurement and design of source-location privacy schemes JO - IEEE Transaction on Parallel and Distributed Systems VL - 3 ID - Li2012 ER - TY - BOOK AU - Li, Y. AU - Li, J. AU - Ren, J. AU - Wu, J. PY - 2012 DA - 2012// TI - Providing hop-by-hop authentication and source privacy in wireless sensor networks (IEEE INFOCOM2012 ID - Li2012 ER - TY - JOUR AU - Mahmoud, M. M. E. A. AU - Shen, X. PY - 2012 DA - 2012// TI - A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks JO - IEEE Transaction on Parallel and Distributed Systems VL - 23 UR - https://doi.org/10.1109/TPDS.2011.302 DO - 10.1109/TPDS.2011.302 ID - Mahmoud2012 ER - TY - BOOK AU - Ren, J. AU - Tang, D. PY - 2011 DA - 2011// TI - Combining source-location privacy and routing efficiency in wireless sensor networks (2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) ID - Ren2011 ER - TY - BOOK AU - Gurjar, A. AU - Patil, A. R. B. PY - 2013 DA - 2013// TI - Cluster based anonymization for source location privacy in wireless sensor network (2013 International Conference on Communication Systems and Network Technologies (CSNT) ID - Gurjar2013 ER - TY - BOOK AU - Spachos, P. AU - Liang, S. AU - Bui, F. M. AU - Hatznakos, D. PY - 2011 DA - 2011// TI - Improving source-location privacy through opportunistic routing in wireless sensor networks (2011 IEEE Symposium on Computers and Communications (ISCC) ID - Spachos2011 ER - TY - CHAP AU - Sivashankari, S. AU - Raseen, M. M. PY - 2013 DA - 2013// TI - A framework of location privacy and minimum average communication under the global eavesdropper BT - 2013 International Conference on Current Trends in Engineering and Technology PB - ICCTET CY - Coimbatore UR - https://doi.org/10.1109/ICCTET.2013.6675994 DO - 10.1109/ICCTET.2013.6675994 ID - Sivashankari2013 ER - TY - BOOK AU - Ying, B. AU - Makrakis, D. AU - Mouftah, H. T. PY - 2011 DA - 2011// TI - A protocol for sink location privacy protection in wireless sensor networks (2011 IEEE Global Communications Conference ID - Ying2011 ER - TY - BOOK AU - Nezhad, A. A. AU - Makrakis, D. AU - Miri, A. PY - 2007 DA - 2007// TI - Anonymous topology discovery for multi-hop wireless sensor networks (3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks ID - Nezhad2007 ER - TY - JOUR AU - Bicakci, K. AU - Bagci, I. E. AU - Tavli, B. PY - 2011 DA - 2011// TI - Lifetime bounds of wireless sensor networks preserving perfect sink unobservability JO - IEEE Commun. Lett VL - 5 UR - https://doi.org/10.1109/LCOMM.2011.010311.101885 DO - 10.1109/LCOMM.2011.010311.101885 ID - Bicakci2011 ER - TY - JOUR AU - Mehta, K. AU - Liu, D. AU - Wright, M. PY - 2012 DA - 2012// TI - Protecting location privacy in sensor networks against a global eavesdropper JO - IEEE Transaction on Mobile Computing VL - 11 UR - https://doi.org/10.1109/TMC.2011.32 DO - 10.1109/TMC.2011.32 ID - Mehta2012 ER - TY - JOUR AU - Acharya, U. AU - Younis, M. PY - 2010 DA - 2010// TI - Increasing base-station anonymity in wireless sensor networks JO - Journal of Ad-hoc Network VL - 8 UR - https://doi.org/10.1016/j.adhoc.2010.03.001 DO - 10.1016/j.adhoc.2010.03.001 ID - Acharya2010 ER - TY - CHAP AU - Ebrahimi, Y. AU - Younis, M. PY - 2011 DA - 2011// TI - Using deceptive packets to increase base-station anonymity in wireless sensor network BT - Proc. of 7th International Conference on Wireless Communication and Mobile Computing Conference, Istanbul, Turkey ID - Ebrahimi2011 ER - TY - CHAP AU - Ebrahimi, Y. AU - Younis, M. PY - 2011 DA - 2011// TI - Increasing transmission power for higher base-station anonymity in wireless sensor network BT - The proc. of the IEEE International Conference on Communications (ICC 2011) UR - https://doi.org/10.1109/icc.2011.5962411 DO - 10.1109/icc.2011.5962411 ID - Ebrahimi2011 ER - TY - CHAP AU - Park, H. AU - Song, S. AU - Choi, B. Y. AU - Huang, C. T. PY - 2013 DA - 2013// TI - Passages: preserving anonymity of sources and sinks against global eavesdroppers BT - Proc. on IEEE Infocom, Turin, Italy ID - Park2013 ER - TY - CHAP AU - Li, X. AU - Wang, X. AU - Zheng, N. AU - Wan, Z. PY - 2009 DA - 2009// TI - Enhanced location privacy protection of base station in wireless sensor networks BT - Proc. of 5th International Conference on Mobile Adhoc and Sensor Networks, Fujian, China ID - Li2009 ER - TY - CHAP AU - Yao, J. PY - 2010 DA - 2010// TI - Preserving mobile-sink-location privacy in wireless sensor networks BT - Proc. of 2nd International Workshop on Database Technology and Applications, Wuhan, China ID - Yao2010 ER - TY - CHAP AU - Chen, H. AU - Lou, W. PY - 2010 DA - 2010// TI - From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks BT - Proc. of 29th International Conference on Performance Computing and Communications Conference, Hong Kong, China UR - https://doi.org/10.1109/PCCC.2010.5682341 DO - 10.1109/PCCC.2010.5682341 ID - Chen2010 ER - TY - CHAP AU - Ying, B. AU - Gallardo, J. R. AU - Makrakis, D. AU - Mouftah, H. T. PY - 2011 DA - 2011// TI - Concealing of the sink location in WSNs by artificially homogenizing traffic intensity BT - IEEE Infocom 2011, Shanghai, China ID - Ying2011 ER - TY - JOUR AU - Li, N. AU - Zhang, N. AU - Das, S. K. AU - Thuraisingham, B. PY - 2009 DA - 2009// TI - Privacy preservation in wireless sensor networks: a state-of-the-art survey JO - Ad Hoc Netw VL - 7 UR - https://doi.org/10.1016/j.adhoc.2009.04.009 DO - 10.1016/j.adhoc.2009.04.009 ID - Li2009 ER - TY - BOOK AU - Kiraz, O. AU - Levi, A. PY - 2013 DA - 2013// TI - Maintaining trajectory privacy in mobile wireless sensor networks (2013 IEEE Conference on Communications and Network Security (CNS) UR - https://doi.org/10.1109/CNS.2013.6682748 DO - 10.1109/CNS.2013.6682748 ID - Kiraz2013 ER - TY - BOOK AU - Kang, L. PY - 2009 DA - 2009// TI - Protecting location privacy in large-scale wireless sensor network (IEEE ICC '09 ID - Kang2009 ER - TY - JOUR AU - D'ıaz, C. AU - Preneel, B. PY - 2004 DA - 2004// TI - Taxonomy of mixes and dummy traffic JO - Information Security Management, Education and Privacy, IFIP International Federation for Information Processing VL - 148 UR - https://doi.org/10.1007/1-4020-8145-6_18 DO - 10.1007/1-4020-8145-6_18 ID - D'ıaz2004 ER - TY - STD TI - Blue Radios Inc: Order and price info. . Accessed in February 2006 http://www.digikey.cn/cn/zhs/techzone/wireless/supplier/BlueRadios_Inc__822.html?WT.z_ref_page_id=21 UR - http://www.digikey.cn/cn/zhs/techzone/wireless/supplier/BlueRadios_Inc__822.html?WT.z_ref_page_id=21 ID - ref39 ER - TY - BOOK AU - Niculescu, D. AU - Nath, B. PY - 2003 DA - 2003// TI - Adhoc positioning system (APS) using AoA, in Proceedings of IEEE INFOCOM ID - Niculescu2003 ER - TY - BOOK AU - Savvides, A. AU - Han, C. AU - Srivastava, M. PY - 2001 DA - 2001// TI - Dynamic fine-grained localization in ad-hoc networks of sensors, in Proceedings of ACM MobiCom ID - Savvides2001 ER - TY - CHAP AU - Eschenaur, L. AU - Gligor, V. PY - 2002 DA - 2002// TI - A key-management scheme for distributed sensor networks BT - Proc. 9th ACM Conference on Computer and Communications Security, Washington, DC, USA ID - Eschenaur2002 ER - TY - JOUR AU - Intanagonwiwat, C. AU - Govindan, R. AU - Estrin, D. AU - Heidemann, J. AU - Silva, F. PY - 2003 DA - 2003// TI - Directed diffusion for wireless sensor networking JO - IEEE/ACM Transactions on Networking (TON) VL - 11 UR - https://doi.org/10.1109/TNET.2002.808417 DO - 10.1109/TNET.2002.808417 ID - Intanagonwiwat2003 ER - TY - CHAP AU - Oikonomou, K. AU - Stavrakakis, I. PY - 2007 DA - 2007// TI - Performance analysis of probabilistic flooding using random graphs BT - IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007. Espoo, Finland, June 2007 ID - Oikonomou2007 ER - TY - JOUR AU - Chang, N. B. AU - Liu, M. Y. PY - 2007 DA - 2007// TI - Controlled flooding search in a large network JO - IEEE Transaction on Networking VL - 15 UR - https://doi.org/10.1109/TNET.2007.892880 DO - 10.1109/TNET.2007.892880 ID - Chang2007 ER - TY - CHAP AU - Sastry, N. AU - Wagner, D. PY - 2004 DA - 2004// TI - Security considerations for IEEE 802.15.4 networks BT - Wise'04: Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, USA UR - https://doi.org/10.1145/1023646.1023654 DO - 10.1145/1023646.1023654 ID - Sastry2004 ER - TY - CHAP AU - Heinzelman, W. T. AU - Chandrakasan, A. AU - Balakrishnam, H. PY - 2000 DA - 2000// TI - Energy-efficient communication protocol for wireless microsensor network BT - Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 2, Hawaii, USA ID - Heinzelman2000 ER - TY - STD TI - Opnet http://www.opnet.com UR - http://www.opnet.com ID - ref48 ER - TY - JOUR AU - Kamin, E. D. PY - 1984 DA - 1984// TI - A parallel algorithm for the knapsack problem JO - IEEE Transaction on Computers VL - 33 ID - Kamin1984 ER -