Constrained random routing mechanism for source privacy protection in WSNs

W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs
backtracing strategy to locate source nodes by analyzing transmission paths. With the …

[引用][C] Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

W Chen, M Zhang, G Hu, X Tang… - IEEE Access, 2017 - ui.adsabs.harvard.edu
Constrained Random Routing Mechanism for Source Privacy Protection in WSNs - NASA/ADS
Now on home page ads icon ads Enable full ADS view NASA/ADS Constrained Random …

Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs
backtracing strategy to locate source nodes by analyzing transmission paths. With the …

[PDF][PDF] Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - researchgate.net
In wireless sensor networks (WSNs), it is a typical threat to source privacy that an attacker
performs backtracing strategy to locate source nodes by analyzing transmission paths. With …

[引用][C] Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

W CHEN, M ZHANG, G HU, X TANG, AK SANGAIAH