References
- C. Karlof and D. Wagner ,'Secure routing in wireless sensor networks: attacks and countermeasures', Ad Hoc Networks, Vol.1, No.1, pp.293-315, 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
- J. Yick, B. Mukherjee, and D. Ghosal, 'Wireless sensor network survey,' Computer Networks, Vol. 52, No.12, pp.2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
- C. Ozturk, Y. Zhang, and W. Trappe, 'Source-location privacy in energy-constrained sensor network routing,' Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.88-93, 2004.
- J. Deng, R. Han, and S. Mishra, 'Countermeasures against traffic analysis attacks in wireless sensor networks,' Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.
- P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, 'Enhancing source-location privacy in sensor network routing,' Proc. of the 25th IEEE International Conference on Distributed Computing Systems, pp.599-608, 2005.
- L. Zhang, 'A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing,' Proc. of the ACM International Wireless Communication and Mobile Computing Conference, pp.33-38, 2006.
- Y. Jian, S. Chen, Z. Zhang, L. Zhang, 'Protecting receiver-location privacy in wireless sensor networks,' Proc. of the 26th IEEE Conference on Computer Communications, pp.1955-1963, 2007.
- G.-W. Yang, H.-J. Lim, Y. Tscha, 'Location privacy enhanced routing for sensor networks in the presence of dormant sources,' Journal of KIISE: Information Networking, Vol.36, No.1, pp.12-23, 2008.
- Y. Tscha, 'Routing for enhancing source-location privacy with low delivery latency in sensor networks,' The Journal of Korea Information and Communication Society, Vol.33, No.8, pp.636-645, 2008.
- K. Mehta, D. Lie, and M. Wright, 2007, Location privacy in sensor networks against a global eavesdropper, Proc. of the 15th IEEE International Conference on Network Protocols: Session VIII, #4
- Y. Ouyang, Z. Le, G. Chen, and J. Ford, 'Entrapping adversaries for source protection in sensor networks,' Proc. of the 7th IEEE International Symposium on a Word of Wireless, Mobile and Multimedia Networks, pp.23-32, 2006 https://doi.org/10.1109/WOWMOM.2006.40
- S. Puthenpurayil, R. Gu, and S. S. Bhattacharyya, 'Energy-aware data compression for wireless sensor networks,' Proc. of the International Conference on Acoustics, Speech, and Signal Processing, Vol.2, pp.45-48, 2007.
- Y.-B. Ko and N. Vaidya, 'Geocasting in mobile ad hoc networks: location-based multicast algorithms,' Proc. of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.101-110, 1999
- K. Obraczka, K. Viswanath, and G. Tsudik, 'Flooding for reliable multicast in multi-hop ad hoc networks,' Wireless Networks, Vol.7, pp.627-634, 2001 https://doi.org/10.1023/A:1012323519059
- B. Karp and H.-T. Kung, 'Greedy perimeter stateless routing for wireless networks,' Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.243-254, 2000.
- P. Bose, P. Morin, I. Stojmenovic and J. Urrutia, 'Routing with guaranteed delivery in ad hoc wireless networks,' Proc. of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp.48-55, 1999
- R, Nelson and L. Kleinrock, 'The spatial capacity of a slotted aloha multihop packet radio network with capture,' IEEE Transaction on Communications, Vol.32, No.6, pp.684-694, 1984. https://doi.org/10.1109/TCOM.1984.1096124