References
- P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of Int. Conf. on Distributed Computing System 2005, Columbus, Ohio, USA, June 6-9, 2005, pp.1-10.
- Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of IEEE (INFOCOM) Int. Conf. on Computer Communications 2007, Anchorage, Alaska, USA, May 6-12, 2007, pp. 1955-1963.
- K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320-336. https://doi.org/10.1109/TMC.2011.32
- Y. Tscha, "Concealing communication paths in wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 1, 2014, pp. 115-130.
- Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, and Fillia Makedon, "Source location privacy against laptop-class attacks in sensor networks," In Proc. of ACM 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22-25, 2008, pp. 5-14.
- M. Yon and Y. Him, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897. https://doi.org/10.13067/JKIECS.2014.9.8.889
- K. Kim, B. Kim, S. Bae, and D. Kim, "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
- C. See, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.