参考文献/References:
[1] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1 132-1 146.
[2]Kamat P,Zhang Y,Trappe W,et al.Enhancing source-location privacy in sensor net routing[C]//Proccedings of the 25th International Conference on Distributed Computing Systems(ICDCS).Ohio,2005:599-608.
[3]Silvija Kokalj-Filipovic,Fabrice Le Fessant,Predrag Spasojevic.Trade-offs of source location protection in globally attacked sensor networks:a case analysis[C]//2011 8th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Salt Lake City,2011:323-331.
[4]Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN).Washing DC,2004:88-93.
[5]姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1 437-1 441.
[6]Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle[C]//Proceedings of the IEEE Intenational Conference on Communications(ICC).Beijing,2008:1 630-1 634.
[7]陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1 737-1 747.
[8]Edith C H Ngai,Ioana Rodhe.On providing location privacy for mobile sinks in wireless sensor networks[J].Wireless Networks,2013,19(1):115-130.
[9]Yao Lin,Kang Lin,Deng Fangyu,et al.Protecting source-location privacy based on multirings in wireless sensor networks[EB/OL].[2013-06-21]DOI:10.1002/cpe.3075.
[10]马朝,斌贾晋,康张立军.Ad hoc网络中广播风暴的抑制方案[J].中国数据通信,2005(3):35-39.
相似文献/References:
[1]张丽虹.无线传感网络改进混合移动代理路由的研究[J].南京师大学报(自然科学版),2012,35(04):145.
Zhang Lihong.Study on Improved Hybrid Mobile Agent Routing in Wireless Sensor Networks[J].Journal of Nanjing Normal University(Natural Science Edition),2012,35(01):145.
[2]李致远,朱求志,吴永焜,等.基于小波分析的无线传感网实时异常检测算法[J].南京师大学报(自然科学版),2014,37(01):87.
Li Zhiyuan,Zhu Qiuzhi,Wu Yongkun,et al.Wavelet Analysis-Based Real-Time Anomaly Detection Algorithm for Wireless Sensor Network[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):87.
[3]王一蕾,吴英杰,孙 岚,等.面向多敏感属性保护的p-覆盖k-匿名算法[J].南京师大学报(自然科学版),2013,36(04):41.
Wang Yilei,Wu Yingjie,Sun Lan,et al.A p-Cover k-Anonymity Algorithm for Protecting Multiple Sensitive Attributes[J].Journal of Nanjing Normal University(Natural Science Edition),2013,36(01):41.
[4]徐晓菊,唐 翔,黄为勇.一种基于RSSI的煤矿井下WSN节点快速定位算法[J].南京师大学报(自然科学版),2014,37(04):158.
Xu Xiaoju,Tang Xiang,Huang Weiyong.A Fast Node Localization Algorithm for Coal-mine UndergroundBased on RSSI[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):158.
[5]陈 璟,虞继敏.基于果蝇—广义回归神经网络优化的WSN节点定位算法[J].南京师大学报(自然科学版),2017,40(02):31.[doi:10.3969/j.issn.1001-4616.2017.02.006]
Chen Jing,Yu Jimin.Node Localization Algorithm of WSN Based on Fruit Flies Optimizationand Generalized Regression Neural Network[J].Journal of Nanjing Normal University(Natural Science Edition),2017,40(01):31.[doi:10.3969/j.issn.1001-4616.2017.02.006]
[6]李邦源,张春辉,常 荣,等.5G边缘计算环境下资源效用与隐私保护权衡的服务迁移方法[J].南京师大学报(自然科学版),2021,44(04):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]
Li Bangyuan,Zhang Chunhui,Chang Rong,et al.A Service Offloading Method for Resource Utilization and PrivacyPreservation Trade-offs in 5G-Enabled Edge Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2021,44(01):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]