{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:01:32Z","timestamp":1725793292886},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319063195"},{"type":"electronic","value":"9783319063201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06320-1_3","type":"book-chapter","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T00:59:27Z","timestamp":1398646767000},"page":"15-27","source":"Crossref","is-referenced-by-count":1,"title":["Preserving Receiver-Location Privacy in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Javier","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Ruben","family":"Rios","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Cuellar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"3_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I. Akyildiz","year":"2002","unstructured":"Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-23490-3_17","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S. Chang","year":"2011","unstructured":"Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol.\u00a06843, pp. 190\u2013201. Springer, Heidelberg (2011)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., Lou, W.: From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. In: 29th International Performance Computing and Communications Conference, IPCCC 2010, pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Makki, K., Yen, K., Pissinou, N.: Node Compromise Modeling and its Applications in Sensor Networks. In: 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 575\u2013582 (July 2007)","DOI":"10.1109\/ISCC.2007.4381514"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2005.12.003","volume":"2","author":"J. Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing\u00a02(2), 159\u2013186 (2006)","journal-title":"Pervasive and Mobile Computing"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/DSN.2004.1311934","volume-title":"International Conference on Dependable Systems and Networks, DSN 2004","author":"J. Deng","year":"2004","unstructured":"Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: International Conference on Dependable Systems and Networks, DSN 2004, pp. 637\u2013646. IEEE Computer Society, Los Alamitos (2004)"},{"key":"3_CR7","unstructured":"Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 113\u2013126 (2005)"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.comcom.2010.05.014","volume":"34","author":"R. Pietro Di","year":"2011","unstructured":"Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Comput. Commun.\u00a034(3), 515\u2013523 (2011)","journal-title":"Comput. Commun."},{"key":"3_CR9","unstructured":"Eiben, A., Smith, J.: Introduction to Evolutionary Computing. Natural Computing, 2nd edn. Springer (2007)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955\u20131963 (2007)","DOI":"10.1109\/INFCOM.2007.227"},{"issue":"10","key":"3_CR11","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/T-WC.2008.070182","volume":"7","author":"Y. Jian","year":"2008","unstructured":"Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver\u2019s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications\u00a07(10), 3769\u20133779 (2008)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3_CR12","unstructured":"Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599\u2013608 (2005)"},{"key":"3_CR13","first-page":"23","volume-title":"27th International Conference on Distributed Computing Systems, ICDCS 2007","author":"P. Kamat","year":"2007","unstructured":"Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: 27th International Conference on Distributed Computing Systems, ICDCS 2007, p. 23. IEEE Computer Society, Washington, DC (2007)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 88\u201393 (2004)","DOI":"10.1145\/1029102.1029117"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Proano, A., Lazos, L.: Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, April 17-19. ACM, Budapest (2013)","DOI":"10.1145\/2462096.2462112"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-33167-1_10","volume-title":"Computer Security \u2013 ESORICS 2012","author":"R. Rios","year":"2012","unstructured":"Rios, R., Cuellar, J., Lopez, J.: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 163\u2013180. Springer, Heidelberg (2012)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"2518","DOI":"10.1049\/iet-com.2010.0825","volume":"5","author":"R. Rios","year":"2011","unstructured":"Rios, R., Lopez, J.: Analysis of Location Privacy Solutions in Wireless Sensor Networks. IET Communications\u00a05, 2518\u20132532 (2011)","journal-title":"IET Communications"},{"key":"3_CR18","first-page":"112","volume-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010","author":"T.M. Vu","year":"2010","unstructured":"Vu, T.M., Safavi-Naini, R., Williamson, C.: Securing wireless sensor networks against large-scale node capture attacks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 112\u2013123. ACM, New York (2010)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 1\u201311 (2012), doi:10.1007\/s00779-012-0539-9","DOI":"10.1007\/s00779-012-0539-9"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: 1st International Workshop on Security in Computers, Networking and Communications, pp. 1005\u20131010 (2011)","DOI":"10.1109\/INFCOMW.2011.5928957"},{"issue":"4","key":"3_CR21","doi-asserted-by":"crossref","first-page":"2163","DOI":"10.1007\/s11235-011-9539-8","volume":"52","author":"L. Zhang","year":"2013","unstructured":"Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommunication Systems\u00a052(4), 2163\u20132176 (2013)","journal-title":"Telecommunication Systems"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06320-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T18:14:15Z","timestamp":1558894455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06320-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319063195","9783319063201"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06320-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}