1 |
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of The 25th Int. Conf. on Distributed Computing Systems, Columbus, OH, Apr. 2005, pp. 1-10.
|
2 |
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of 26th Annual IEEE Conf. on Computer Communications IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp. 1955-1963.
|
3 |
K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320- 336.
DOI
|
4 |
E. Ngai and I. Rodhe, "On providing location privacy for mobile sinks in wireless sensor networks," Wireless Networks, vol. 19, no. 1, 2013, pp. 115-130.
DOI
|
5 |
C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.
과학기술학회마을
|
6 |
Y. Tscha, "Concealing communication source and destination in wireless sensor networks(Part I): Protocol Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 2, 2013, pp. 219-226.
과학기술학회마을
DOI
|
7 |
M.-Y. Son and Y.-H. Kim, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897.
과학기술학회마을
DOI
|
8 |
K. Kim, B. Kim, S. Bae, and D. Kim "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
과학기술학회마을
|