Towards Statistically Strong Source Anonymity for Sensor Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.51-55, 2008. ,
DOI : 10.1109/INFOCOM.2008.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7702
Privacy preservation in wireless sensor networks: A state-of-the-art survey, Ad Hoc Networks, vol.7, issue.8, pp.1501-1514, 2009. ,
DOI : 10.1016/j.adhoc.2009.04.009
PDA, Proceedings of the 26th IEEE International Conference on Computer Communications, pp.2045-2053, 2007. ,
DOI : 10.1145/1993042.1993048
Privacypreserving robust data aggregation in wireless sensor networks, pp.195-213, 2009. ,
Preserving source location privacy in monitoringbased wireless sensor networks, 20th International Parallel and Distributed Processing Symposium, pp.77-88, 2006. ,
Enhancing Source-Location Privacy in Sensor Network Routing, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp.599-608, 2005. ,
DOI : 10.1109/ICDCS.2005.31
Source-location privacy in energy-constrained sensor network routing, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.88-93, 2004. ,
DOI : 10.1145/1029102.1029117
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7586
Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks, Lecture Notes in Computer Science, vol.4026, p.202, 2006. ,
DOI : 10.1007/11776178_13
Protecting Receiver-Location Privacy in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1955-1963, 2007. ,
DOI : 10.1109/INFCOM.2007.227
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.517.233
Location Privacy in Sensor Networks Against a Global Eavesdropper, 2007 IEEE International Conference on Network Protocols, pp.314-323, 2007. ,
DOI : 10.1109/ICNP.2007.4375862
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.7215
Towards event source unobservability with minimum network traffic in sensor networks, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.77-88, 2008. ,
DOI : 10.1145/1352533.1352547
Source location privacy against laptop-class attacks in sensor networks, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-10, 2008. ,
DOI : 10.1145/1460877.1460884
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures, 5th International Conference on Security and Privacy in Communication Networks, p.373, 2009. ,
DOI : 10.1109/ICDCS.2007.146
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.403.2099
Towards Measuring Anonymity, Third Internation Workshop in Privacy Enhancing Technologies, pp.184-188, 2003. ,
DOI : 10.1007/3-540-36467-6_5
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
k-anonymous message transmission, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.122-130, 2003. ,
DOI : 10.1145/948109.948128
A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on Mobile Computing, vol.5, issue.2, pp.128-143, 2006. ,
DOI : 10.1109/TMC.2006.16