{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:25:21Z","timestamp":1743053121608,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811518980"},{"type":"electronic","value":"9789811518997"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1899-7_13","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T16:02:38Z","timestamp":1574870558000},"page":"177-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Clustering-Anonymization-Based Differential Location Privacy Preserving Protocol in WSN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5554-7930","authenticated-orcid":false,"given":"Ren-ji","family":"Huang","sequence":"first","affiliation":[]},{"given":"Qing","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Mo-Ci","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"13_CR1","unstructured":"Li-min, S., Yuang, Z., Qing-chao, L., et al.: Fundamentals of wireless sensor networks, Tsinghua University, Beijing, pp. 3\u201313 (2014)"},{"issue":"S2","key":"13_CR2","first-page":"81","volume":"47","author":"H Feng","year":"2010","unstructured":"Feng, H., Hong-wei, C., Zong-ke, J., Ti-jiang, S., et al.: Review of recent progress on wireless sensor network applications. J. Comput. Res. Dev. 47(S2), 81\u201387 (2010)","journal-title":"J. Comput. Res. Dev."},{"key":"13_CR3","unstructured":"Ynag, X., Ma, K.: Evolution of wireless sensor network security. In: World Automation Congress, pp. 1\u20135 (2016)"},{"issue":"3","key":"13_CR4","first-page":"617","volume":"26","author":"H Peng","year":"2015","unstructured":"Peng, H., Chen, H., Zhang, X.-Y., et al.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617\u2013639 (2015)","journal-title":"J. Softw."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.sna.2015.01.018","volume":"224","author":"L Cheng","year":"2015","unstructured":"Cheng, L., Wang, Y., Wu, H., et al.: Non-parametric location estimation in rough wireless environments for wireless sensor network. Sens. Actuators, A 224, 57\u201364 (2015)","journal-title":"Sens. Actuators, A"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Groat, M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the INFOCOM, pp. 2024\u20132032. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5935010"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Babar, S.A., Prasad, N., et al.: Proposed embedded security framework for Internet of Things (IoT). In: The Wireless Communication, Vehicular Technology, pp. 1\u20135 (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: The 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88\u201393 (2004)","DOI":"10.1145\/1029102.1029117"},{"issue":"9","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.3724\/SP.J.1016.2010.01736","volume":"33","author":"C Juan","year":"2010","unstructured":"Juan, C., Bin-xing, F., Li-hua, Y., et al.: A source-location privacy preservation protocol in wireless sensor networks using source- based restricted flooding. Chin. J. Comput. 33(9), 1736\u20131747 (2010)","journal-title":"Chin. J. Comput."},{"key":"13_CR10","volume-title":"Research and Implementation of Location Privacy Protection Solution in Wireless Sensor Network","author":"X Fu-zhi","year":"2014","unstructured":"Fu-zhi, X.: Research and Implementation of Location Privacy Protection Solution in Wireless Sensor Network. University of Electronic Science and Technology of China, Chengdu (2014)"},{"issue":"9","key":"13_CR11","first-page":"1405","volume":"29","author":"Z Jiangnan","year":"2016","unstructured":"Jiangnan, Z., Chun-liang, C.: A Scheme to protect the source location privacy in wireless sensor networks. Chin. J. Sens. Actuators 29(9), 1405\u20131409 (2016)","journal-title":"Chin. J. Sens. Actuators"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Shao, M., Yang, Y., Zhu, S., et al.: Towards statistically strong source anonymity for sensor networks. In: The 27th Conference on Computer Communications, pp. 51\u201355 (2008)","DOI":"10.1109\/INFOCOM.2007.19"},{"key":"13_CR13","volume-title":"Research on the source-location privacy in wireless sensor networks against a global eavesdropper","author":"H Xiao-yan","year":"2014","unstructured":"Xiao-yan, H.: Research on the source-location privacy in wireless sensor networks against a global eavesdropper. Central South University, Changsha (2014)"},{"issue":"4","key":"13_CR14","first-page":"23","volume":"37","author":"N Xiaoguang","year":"2016","unstructured":"Xiaoguang, N., Chuan-bo, W., Ya-lan, Y.: Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN. J. Commun. 37(4), 23\u201333 (2016)","journal-title":"J. Commun."},{"key":"13_CR15","first-page":"16","volume-title":"Modern Pattern Recognition","author":"S Ji-xiang","year":"2016","unstructured":"Ji-xiang, S.: Modern Pattern Recognition, pp. 16\u201340. Higher Education Press, Beijing (2016)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Kumar, K.A, Rangan, C.P.: Privacy preserving DBSCAN algorithm for clustering. In: Proceedings of Advanced Data Mining and Applications, Third International Conference, ADMA 2007, Harbin, China, 6\u20138 August 2007, DBLP, pp. 57-68 (2007)","DOI":"10.1007\/978-3-540-73871-8_7"},{"issue":"5","key":"13_CR17","first-page":"125","volume":"37","author":"L Xiao-qian","year":"2016","unstructured":"Xiao-qian, L., Qian-mu, L.: Differentially private data release based on clustering anonymization. J. Commun. 37(5), 125\u2013129 (2016)","journal-title":"J. Commun."},{"key":"13_CR18","unstructured":"Min-rui, C., Hui-hui, F.: Efficient (K,L)-anonymous privacy protection based on clustering. Comput. Eng. 41(01), 139\u2013142\u2009+\u2009163 (2015)"},{"key":"13_CR19","unstructured":"Zhao-yan, M.: Research on anonymous privacy protection algorithm based on clustering, Xi\u2019an University of Technology (2017)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"issue":"1","key":"13_CR21","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"issue":"1","key":"13_CR22","first-page":"101","volume":"37","author":"X Ping","year":"2014","unstructured":"Ping, X., Tian-qing, Z., Xiao-feng, W.: A survey on differential privacy and applications. Chin. J. Comput. 37(1), 101\u2013122 (2014)","journal-title":"Chin. J. Comput."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., et al.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Conference on Theory of Cryptography, New York, USA, pp. 265\u2013284 (2006)","DOI":"10.1007\/11681878_14"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: IEEE, Symposium on Foundations of Computer Science, pp. 61\u201370. IEEE Computer Society (2010)","DOI":"10.1109\/FOCS.2010.85"},{"issue":"12","key":"13_CR25","first-page":"79","volume":"50","author":"Z Xue-jun","year":"2016","unstructured":"Xue-jun, Z., Xiao-lin, G., Jing-hua, J.: A user-centric location privacy-preserving method with differential perturbation for location-based services. J. Xi\u2019an Jiao-tong Univ. 50(12), 79\u201386 (2016)","journal-title":"J. Xi\u2019an Jiao-tong Univ."},{"issue":"12","key":"13_CR26","first-page":"2825","volume":"54","author":"Z Wei-jun","year":"2017","unstructured":"Wei-jun, Z., Qing-huang, Y., Wei-dong, Y., et al.: Trajectory privacy preserving based on statistical differential privacy. J. Comput. Res. Develop. 54(12), 2825\u20132832 (2017)","journal-title":"J. Comput. Res. Develop."},{"issue":"10","key":"13_CR27","first-page":"2354","volume":"53","author":"J Huo-wen","year":"2016","unstructured":"Huo-wen, J., Guo-sun, Z., Ke-kun, H.: A graph-clustering anonymity method implemented by genetic algorithm for privacy-preserving. J. Comput. Res. Develop. 53(10), 2354\u20132364 (2016)","journal-title":"J. Comput. Res. Develop."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Mcsherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: The 2009 ACM SIGMOD International Conference on Management of Data. Providence, pp. 19\u201330. ACM, Rhode Island (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"13_CR29","unstructured":"Yu-hong, W.: General overview on clustering algorithms. Comput. Sci. 42(S1), 491\u2013499\u2009+\u2009524 (2015)"}],"container-title":["Communications in Computer and Information Science","Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1899-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T21:03:58Z","timestamp":1574888638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1899-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811518980","9789811518997"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1899-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BigData","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigdat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/grid.hust.edu.cn\/bigdata2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"324","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}