2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) 2017
DOI: 10.1109/icsess.2017.8343044
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection algorithm based on linear directional phantom source node in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Therefore, (A7) has the maximum at one of the boundary points E 1 cu = 0 or E 1 cu = E CU s as long as we prove the monotonicity of g(E 1 cu ). We differentiate g(E The denominator of (A8) is constant positive.…”
Section: Discussionmentioning
confidence: 69%
See 1 more Smart Citation
“…Therefore, (A7) has the maximum at one of the boundary points E 1 cu = 0 or E 1 cu = E CU s as long as we prove the monotonicity of g(E 1 cu ). We differentiate g(E The denominator of (A8) is constant positive.…”
Section: Discussionmentioning
confidence: 69%
“…Recently, the wireless sensor network (WSN) with privacy preserving has been widely considered in the civilian fields [1,2]. However, due to the limited power supply for sensor nodes, energy efficiency of relay assisted WSN has attracted more and more attention [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, (A7) has the maximum at one of the boundary points E 1 cu = 0 or E 1 cu = E CU s as long as we prove the monotonicity of g(E 1 cu ). We differentiate g(E 1 cu ) with respect to E The denominator of (A8) is constant positive.…”
Section: Appendix Amentioning
confidence: 69%
“…Another location privacy against local attacks only called BSLDPS (Base source Linear Directional Phantom Source) proposed in [23] that tries to randomize phantom source selection. The packet will be transmitted in random walks multiple hops based on nodes location coordinates until it reaches the phantom source.…”
Section: Fig 3 Taxonomy Of Contextual Unobservability In Wsnmentioning
confidence: 99%