M. Shao, Y. Yang, S. Zhu, and G. Cao, Towards Statistically Strong Source Anonymity for Sensor Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.51-55, 2008.
DOI : 10.1109/INFOCOM.2008.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7702

N. Li, N. Zhang, S. Das, and B. Thuraisingham, Privacy preservation in wireless sensor networks: A state-of-the-art survey, Ad Hoc Networks, vol.7, issue.8, pp.1501-1514, 2009.
DOI : 10.1016/j.adhoc.2009.04.009

W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, PDA, Proceedings of the 26th IEEE International Conference on Computer Communications, pp.2045-2053, 2007.
DOI : 10.1145/1993042.1993048

M. Conti, L. Zhang, S. Roy, D. Pietro, R. Jajodia et al., Privacypreserving robust data aggregation in wireless sensor networks, pp.195-213, 2009.

Y. Xi, L. Schwiebert, and W. Shi, Preserving source location privacy in monitoringbased wireless sensor networks, 20th International Parallel and Distributed Processing Symposium, pp.77-88, 2006.

P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, Enhancing Source-Location Privacy in Sensor Network Routing, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp.599-608, 2005.
DOI : 10.1109/ICDCS.2005.31

C. Ozturk, Y. Zhang, and W. Trappe, Source-location privacy in energy-constrained sensor network routing, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.88-93, 2004.
DOI : 10.1145/1029102.1029117

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7586

W. Conner, T. Abdelzaher, and K. Nahrstedt, Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks, Lecture Notes in Computer Science, vol.4026, p.202, 2006.
DOI : 10.1007/11776178_13

Y. Jian, S. Chen, Z. Zhang, and L. Zhang, Protecting Receiver-Location Privacy in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1955-1963, 2007.
DOI : 10.1109/INFCOM.2007.227

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.517.233

K. Mehta, D. Liu, and M. Wright, Location Privacy in Sensor Networks Against a Global Eavesdropper, 2007 IEEE International Conference on Network Protocols, pp.314-323, 2007.
DOI : 10.1109/ICNP.2007.4375862

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.7215

Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, Towards event source unobservability with minimum network traffic in sensor networks, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.77-88, 2008.
DOI : 10.1145/1352533.1352547

Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, Source location privacy against laptop-class attacks in sensor networks, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-10, 2008.
DOI : 10.1145/1460877.1460884

Y. Yang, S. Zhu, G. Cao, and T. Laporta, An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures, 5th International Conference on Security and Privacy in Communication Networks, p.373, 2009.
DOI : 10.1109/ICDCS.2007.146

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.403.2099

C. Diaz, S. Seys, J. Claessens, and B. Preneel, Towards Measuring Anonymity, Third Internation Workshop in Privacy Enhancing Technologies, pp.184-188, 2003.
DOI : 10.1007/3-540-36467-6_5

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

. Ahn, A. Bortz, and N. Hopper, k-anonymous message transmission, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.122-130, 2003.
DOI : 10.1145/948109.948128

N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on Mobile Computing, vol.5, issue.2, pp.128-143, 2006.
DOI : 10.1109/TMC.2006.16