LI Feng-yun , LI Pei-yu, GAO Fu-xiang, CHANG Gui-ran. Location Privacy Protection for Wireless Sensor Networks Based on Fan-Shaped Region[J]. Journal of Northeastern University:Natural Science, 2013, 34(1): 21-25.
[1]Ozturk C,Zhang Y,Trappe W.Source-location privacy inenergy-constrained sensor network routing[C]//Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM,2004:88-93. [2]Ouyang Y,Le Z,Chen G,et al.Entrapping adversaries for source protection in sensor networks[C]//2006 International Symposium on a World of Wireless Mobile and Multimedia Networks.Washington:IEEE,2006:23-34. [3]Li Y,Ren J.Source-location privacy through dynamic routing in wireless sensor networks[C]//IEEE INFOCOM 2010-IEEE Conference on Computer Communications.San Diego:IEEE,2010:1-9. [4]Lightfoot L,Li Y,Ren J.Preserving source-location privacy in wireless sensor network using STaR routing[C]//53rd IEEE Global Telecommunications Conference.Miami:IEEE,2010:1-5. [5]Li N,Zhang N,Das S K,et al.Privacy preservation in wireless sensor networks:a state-of-the-art survey[J].Ad Hoc Networks,2009,7(8):1501-1514. [6]Nezhad A A,Miri A,Makrakis D.Location privacy and anonymity preserving routing for wireless sensor networks[J].Computer Networks,2008,52(18):3433-3452. [7]Di Pietro R,Viejo A.Location privacy and resilience in wireless sensor networks querying[J].Computer Communications,2011,34(3):515-523. [8]Ouyang Y,Le Z,Liu D,et al.Source location privacy against laptop-class attacks in sensor networks[C]//4th International Conference on Security and Privacy in Communication Networks.Istanbul:ACM,2008:1-10. [9]Han J Q,Zhao W,Zheng M.An analytical model on unbalanced energy consumption in large scale wireless sensor network[C]//3rd International Conference on Measuring Technology and Mechatronics Automation.Shanghai:IEEE,2011:375-378.