Computer Science ›› 2020, Vol. 47 ›› Issue (7): 307-313.doi: 10.11896/jsjkx.200100056
• Information Security • Previous Articles Next Articles
GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen
CLC Number:
[1]LI N,ZHANG N,DAS S K,et al.Privacy preservation in wireless sensor networks:A state-of-the-art survey[J].Ad Hoc Networks,2009,7(8):1501-1514. [2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacyin energy constrained sensor network routing[C]//Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93. [3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems,2005(ICDCS 2005).IEEE,2005:599-608. [4]WANG W P,CHEN L,WANG J X.A Source-Location Privacy Protocol in WSN Based on Locational Angle[C]// IEEE International Conference on Communications,2008(ICC’08).2008. [5]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747. [6]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400. [7]ZHOU L L,SHI R H,ZHONG H,et al.Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks[J].Computer Engineering,2014,40(6):89-94. [8]SUN M S,LIU Y B,HUANG J.Source-location privacy protection strategy through pseudo normal distribution-based phantom routing in WSN[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(1):113-119. [9]WANG W X,LI P Z.A privacy protection method of source location in wireless sensor networks[J].Journal of Chongqing University,2018,41(3):100-108. [10]JIA Z P,WEI X J,PENG W P.Privacy protection strategy about source location in WSNs based on random angle and circumfe-rential Routing[J].Application Research of Computers,2016,33(3):886-890. [11]BAI L Q,LI L,QIAN S G,et al.Source-location privacy protection algorithm in WSNs based on ellipse model[J].Control and Decision,2017,32(2):255-261. [12]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Compu-ters,2018,35(10):3109-3112. [13]SPACHOS P,TOUMPAKARIS D,HATZINAKOS D.Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks[C]//Vehicular Technology Confe-rence.IEEE,2014:1-5. [14]LIU Y,XU Y J,SONG L.Variable-angle based dynamic routing scheme for source-location privacy protection in wireless sensor networks[J].Application Research of Computers,2018,35(1):257-260,265. [15]MA W,SONG L.Source location privacy preservation routingprotocol based on multi-path[J].Computer Engineering and Applications,2018,54(16):81-85,106. [16]REN J,ZHANG Y X,LIU K.An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013,2013:1-15. [17]OUYANG Y,LE X Y,CHEN G L,et al.Entrapping adversaries for source protection in sensor networks[C]//International Symposium on World of Wireless,Mobile and Multimedia Networks,2006(WoWMoM 2006).2006. [18]ZHANG J N,CHU C L.A Scheme to Protect the Source Location Privacy in Wireless Sensor Networks[J].Chinese Journal of Sensors and Actuators,2016,29(9):1405-1409. [19]RUAN Z,LIANG W,SUN D,et al.An efficient and lightweight source privacy protecting scheme for sensor networks using group knowledge[J].International Journal of Distributed Sensor Networks,2013,2013:1-14. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[3] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
[4] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[5] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[6] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[7] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[8] | SUN Zhen-qiang, LUO Yong-long, ZHENG Xiao-yao, ZHANG Hai-yan. Intelligent Travel Route Recommendation Method Integrating User Emotion and Similarity [J]. Computer Science, 2021, 48(6A): 226-230. |
[9] | WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316. |
[10] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[11] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[12] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[13] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[14] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[15] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
|