{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:42:43Z","timestamp":1742380963461},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163548"},{"type":"electronic","value":"9783642163555"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16355-5_22","type":"book-chapter","created":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T16:00:06Z","timestamp":1286208006000},"page":"252-266","source":"Crossref","is-referenced-by-count":13,"title":["Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation"],"prefix":"10.1007","author":[{"given":"Wenbo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Wen Tao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88\u201393 (2004)","DOI":"10.1145\/1029102.1029117"},{"issue":"8","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N. Li","year":"2009","unstructured":"Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad. Hoc. Netw.\u00a07(8), 1501\u20131514 (2009)","journal-title":"Ad. Hoc. Netw."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proc. 25th IEEE International Conference on Distributed Computing Systems, pp. 599\u2013608 (2005)","DOI":"10.1109\/ICDCS.2005.31"},{"key":"22_CR4","unstructured":"Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proc. 20th International Parallel and Distributed Processing Symposium, pp. 425\u2013432 (2006)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ouyang, Y., Le, X., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proc. International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 10\u201334 (2006)","DOI":"10.1109\/WOWMOM.2006.40"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proc. 1st ACM Conference on Wireless Network Security, pp. 77\u201388 (2008)","DOI":"10.1145\/1352533.1352547"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proc. IEEE International Conference on Network Protocols, pp. 314\u2013323 (2007)","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proc. 27th IEEE International Conference on Computer Communications, pp. 466\u2013474 (2008)","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proc. 33rd Hawaii International Conference on System Sciences, pp. 3005\u20133014 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"issue":"4","key":"22_CR10","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O. Younis","year":"2004","unstructured":"Younis, O., Fahmy, S.: HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. on Mob. Comput.\u00a03(4), 366\u2013379 (2004)","journal-title":"IEEE Trans. on Mob. Comput."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.T.: PDA: Privacy-preserving data aggregation in wireless sensor networks. In: Proc. 26th IEEE International Conference on Computer Communications, pp. 2045\u20132053 (2007)","DOI":"10.1109\/INFCOM.2007.237"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A tiny aggregation service for ad-hoc sensor networks. In: Proc. 5th Symposium on Operating Systems Design and Implementation, pp. 131\u2013146 (2002)","DOI":"10.1145\/1060289.1060303"},{"key":"22_CR13","series-title":"Seminumerical Algorithms","first-page":"132","volume-title":"The Art of Computer Programming","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: 3.4. In: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol.\u00a02, pp. 132\u2013133. Addison Wesley Longman, Amsterdam (1998)","edition":"3"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Feng, T., Wang, C., Zhang, W., Ruan, L.: Confidentiality protection for distributed sensor data aggregation. In: Proc. 27th IEEE International Conference on Computer Communications, pp. 475\u2013483 (2008)","DOI":"10.1109\/INFOCOM.2008.20"},{"issue":"3","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1525856.1525858","volume":"5","author":"C. Castelluccia","year":"2009","unstructured":"Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. on Sens. Netw.\u00a05(3), 1\u201336 (2009)","journal-title":"ACM Trans. on Sens. Netw."},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1287\/opre.30.2.223","volume":"30","author":"R.W. Wolff","year":"1982","unstructured":"Wolff, R.W.: Possion arrivals see time averages. Operations Research\u00a030(2), 223\u2013231 (1982)","journal-title":"Operations Research"},{"key":"22_CR17","first-page":"182","volume-title":"Introduction to The Theory of Statistics","author":"A.M. Mood","year":"1974","unstructured":"Mood, A.M., Graybill, F.A., Boes, D.C.: 5.3.2. In: Introduction to The Theory of Statistics, pp. 182\u2013185. McGraw-Hill, New York (1974)"},{"key":"22_CR18","series-title":"Theory","volume-title":"Queueing Systems","author":"L. Kleinrock","year":"1975","unstructured":"Kleinrock, L.: Queueing Systems. Theory, vol.\u00a01. John Wiley and Sons, Inc., Chichester (1975)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16355-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T13:39:58Z","timestamp":1553175598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16355-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163548","9783642163555"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16355-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}