Computer Science ›› 2021, Vol. 48 ›› Issue (5): 334-340.doi: 10.11896/jsjkx.200400099
• Information Security • Previous Articles
GUO Rui, LU Tian-liang, DU Yan-hui
CLC Number:
[1]PENG H,CHEN H,ZHANG X Y,et al.Location privacy preservation in wireless sensor networks[J].Journal of Software,2015,26(3):617-639. [2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacy in energy constrained sensor network routing[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93. [3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems(ICDCS 2005).IEEE,2005:599-608. [4]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747. [5]YAO J,WEN G.Preserving source-location privacy in energy-constrained wireless sensor networks[C]//Proceedings of the 28th International Conference on Distributed Computing Systems Workshops.2008:412-416. [6]LI Y,LIGHTFOOT L,REN J.Routing-based source-locationprivacy protection in wireless sensor networks[C]//2009 IEEE International Conference on Electro/Information Technology.Windsor,Ontario,Canada:IEEE,2009:29-34. [7]WANG W P,CHEN L,WANG J X.A source-location privacyprotocol in WSN based on locational angle[C]//Proceedings of IEEE International Conference on Communications.2008:1630-1634. [8]LONG J,DONG M,OTA K,et al.Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks[J].IEEE Access,2014,2(10):633-651. [9]KUMAR P,SINGH J P,VISHNOI P,et al.Source location privacy using multiple-phantom nodes in WSN[C]//Proceedings of the Tencon.2015:1-6. [10]XU Y,CHA Q M,KE M Y,et al.Phantom routing design for source location protection[J].Computer Engineering and Applications,2018,54(19):88-93. [11]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400. [12]YAO J.Source- location privacy based on directed greedy walk in wireless sensor networks[C]//Proceedings of International Conference on Wireless Communications Networking and Mobile Computing.2010:1-4. [13]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Computers,2018,35(10):3109-3112. [14]HUANG J,SUN M S,ZHU S T,et al.A source-location privacyprotection strategy via pseudo normal distribution-based phantom routing in WSNs[C]//Proceedings of the 30th Annual ACM Symposium on Applied Computing.2015:688-694. [15]JIA Z P,WEI X J,PENG W P.Privacy Protection strategyabout source location in WSNs based on random angle and circumferential routing[J].Application Research of Computers,2016,33(3):886-890. [16]LIGHTFOOT L,LI Y,REN J.Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing[C]//Global Telecommunications Conference (GLOBECOM 2010).2010 IEEE.IEEE,2011.Miami,FL,2010:1-5. [17]MANJULA R,RAJA DATTA.A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs[J].Pervasive and Mobile Computing,2018,44:58-73. [18]LIU G F,XIAO Y.RSSI positioning method based on improved flower pollination algorithm[J].Transducer and Microsystem Technologies,2019,38(11):42-45. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[3] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[4] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[5] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[6] | WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316. |
[7] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[8] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[9] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[10] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[11] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[12] | YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71. |
[13] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
[14] | GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313. |
[15] | WANG Dong, WANG Hu and JIANG Qian-li. Low Power Long Distance Marine Environment Monitoring System Based on 6LoWPAN [J]. Computer Science, 2020, 47(6A): 596-598. |
|