1. Ceng J D, Wang T, Jia W J, et al. A survey on sensor-cloud. Journal of Computing Research and Development, 2017, 54(5): 925-939 (in Chinese)
2. Wang T, Li Y, Gia W J, et al. Research progress of sensor-cloud security. Journal on Communications, 2018, 39(3): 35-52 (in Chinese)
3. Wang H, Han G J, Zhu C S, et al. TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities. Future Generation Computer Systems, 2020,107: 965-974
4. Zhan J C, Wang Q H, Ouyang X Q. Source-location privacy protection routing protocol in wireless sensor networks by avoiding attackers. Computer Engineering and Applications, 2019, 55(12): 103-109 (in Chinese)
5. Jayanthi R, Mohanraj M. An anonymity region construction and two fold location protection scheme for improving source and sink location privacy in WSN. International Journal of Computer Sciences and Engineering, 2019, 7(2): 724-730
6. Houssein E H, Saad M R, Hussain K, et al. Optimal sink node placement in large scale wireless sensor networks based on Harris' hawk optimization algorithm. IEEE Access, 2020, 8: 19381-19397.
7. Di Ying B, Makrakis D, Mouftah H T. Anti-traffic analysis attack for location privacy in WSNs. EURASIP Journal on Wireless Communications and Networking 2014, (1): 131-146
8. Bangash Y A, Zeng L F, Feng D. MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks. Journal of Computer Science and Technology, 2017, 32(5): 991-1007
9. Baroutis N, Younis M. Load-conscious maximization of base-station location privacy in wireless sensor networks. Computer Networks, 2017, 124: 126-139
10. Baroutis N, Younis M. A novel traffic analysis attack model and base-station anonymity metrics for wireless sensor networks. Security and Communication Networks, 2016, 9(18): 5892-5907
11. Ebrahimi Y, Younis M. Using deceptive packets to increase base-station anonymity in wireless sensor network. Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC’11), 2011, Jul 4-8, Istanbul, Turkey. Piscataway, NJ, USA: IEEE, 2011: 842-847
12. Chai G F, Xu M, Xu W Y, et al. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks, 2012, 8(4): 648058-648073
13. Li X F, Wang X Y, Zheng N, et al. Enhanced location privacy protection of base station in wireless sensor networks. Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN’09), 2009, Dec 14-16, Fuzhou, China. Piscataway, NJ, USA: IEEE, 2009: 457-464
14. Ngai E C H. On providing sink anonymity for sensor networks. Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC'09), 2016, Jun 21-24, Leipzig, Germany. New York, NY, USA: ACM, 2016: 269-273
15. Gottumukkala V P V, Pandit V, Li H L, et al. Base-station location anonymity and security technique (BLAST) for wireless sensor networks. Proceedings of the 2012 IEEE International Conference on Communications (ICC’12), 2012, Jun 10-15, Ottawa, Canada. Piscataway, NJ, USA: IEEE, 2012: 6705-6709
16. Baroudi U, Aliyu F M, Shahra E Q N, et al. System for protecting privacy of a base station in wireless sensor networks. USP 10492064. 2019-11-26
17. Bonomi F, Milito R, Zhu J, et al. Fog computing and its role in the internet of things. Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing (MCC’12), 2012, Aug 17, Helsinki Finland. New York, NY, USA: ACM, 2012: 13-16
18. Wang T, Shen X W, Luo H, et al. Research progress of trusted sensor-cloud based on fog computing. Journal on Communications, 2019, 40(3): 170-181 (in Chinese)
19. Zhai J X. Research on authentication protocol in mobile cloud computing. Ph D Thesis. Xuzhou, China: China University of Mining and Technology, 2019 (in Chinese)
20. Wang J, Wang Y L, Zhao G S, et al. Location protection method for mobile crowd sensing based on local differential privacy preference. Peer-to-Peer Networking and Applications, 2019, 12(5): 1097-1109
21. Chen R, Li H R, Qin A K, et al. Private spatial data aggregation in the local setting. Proceedings of the IEEE 32nd International Conference on Data Engineering (ICDE’16), 2016, May 16-20, Helsinki, Finland. Piscataway, NJ, USA: IEEE, 2016: 289-300
22. Fu A A W, Wang K, Wong R C et al. Small sum privacy and large sum utility in data publishing. Journal of Biomedical Informatics, 2014, 50: 20-31
23. Sei Y, Ohsuga A. Differential private data collection and analysis based on randomized multiple dummies for untrusted mobile crowd sensing. IEEE Transactions on Information Forensics and Security 2016, 12(4): 926-939
24. Ma F F, Liu S B, Xiong X X, et al. Privacy protection based on local differential privacy for numerical sensitive data of wearable devices. Journal of Computer Applications, 2019, 39(7): 1985-1990 (in Chinese)
|