{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T08:10:00Z","timestamp":1672992600489},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,8,20]],"date-time":"2016-08-20T00:00:00Z","timestamp":1471651200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00779-016-0949-1","type":"journal-article","created":{"date-parts":[[2016,8,20]],"date-time":"2016-08-20T13:39:53Z","timestamp":1471700393000},"page":"771-783","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An energy-efficient source-anonymity protocol in surveillance systems"],"prefix":"10.1007","volume":"20","author":[{"given":"Xiaoguang","family":"Niu","sequence":"first","affiliation":[]},{"given":"Yihao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yalan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Josep Miquel","family":"Jornet","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,20]]},"reference":[{"issue":"1","key":"949_CR1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2545883","volume":"47","author":"T Winkler","year":"2014","unstructured":"Winkler T, Rinner B et al (2014) Security and privacy protection in visual sensor networks: a survey. ACM Comput Surv (CSUR) 47(1):2\u201342","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2016","key":"949_CR2","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/ACCESS.2016.2529723","volume":"4","author":"Y Sun","year":"2016","unstructured":"Sun Y et al (2016) Internet of things and big data analytics for smart and connected communities. IEEE Access 4(2016):766\u2013773","journal-title":"IEEE Access"},{"issue":"8","key":"949_CR3","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1007\/s00779-014-0786-z","volume":"18","author":"Y Sun","year":"2014","unstructured":"Sun Y, Jara AJ (2014) An extensible and active semantic model of information organizing for the internet of things. Pers Ubiquitous Comput (PUC) 18(8):1821\u20131833","journal-title":"Pers Ubiquitous Comput (PUC)"},{"issue":"4","key":"949_CR4","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1007\/s00779-013-0713-8","volume":"18","author":"J Guo","year":"2014","unstructured":"Guo J, Sun Y et al (2014) Square-root unscented Kalman filtering-based localization and tracking in the internet of things. Pers Ubiquitous Comput (PUC) 18(4):987\u2013996","journal-title":"Pers Ubiquitous Comput (PUC)"},{"key":"949_CR5","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.jpdc.2015.04.003","volume":"81","author":"J Long","year":"2015","unstructured":"Long J et al (2015) An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. J Parallel Distrib Comput 81:47\u201365","journal-title":"J Parallel Distrib Comput"},{"issue":"190903","key":"949_CR6","first-page":"1","volume":"2014","author":"Y Sun","year":"2014","unstructured":"Sun Y et al (2014) Data security and privacy in cloud computing. Int J Distrib Sens Netw 2014(190903):1\u20139","journal-title":"Int J Distrib Sens Netw"},{"key":"949_CR7","unstructured":"Xi Y, Schwiebert L, Shi W (2006) Preserving source location privacy in monitoring-based wireless sensor networks. In: IEEE international parallel and distributed processing symposium (IPDPS 2006), pp 1\u20138"},{"issue":"3","key":"949_CR8","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.3390\/s100301447","volume":"10","author":"RA Shaikh","year":"2010","unstructured":"Shaikh RA et al (2010) Achieving network level privacy in wireless sensor networks. Sensors 10(3):1447\u20131472","journal-title":"Sensors"},{"issue":"4","key":"949_CR9","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF et al (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"issue":"3","key":"949_CR10","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/SURV.2013.011413.00118","volume":"15","author":"M Conti","year":"2013","unstructured":"Conti M, Willemsen J, Crispo B (2013) Providing source location privacy in wireless sensor networks: a survey. IEEE Commun Surv Tutor 15(3):1238\u20131280","journal-title":"IEEE Commun Surv Tutor"},{"key":"949_CR11","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.pmcj.2014.01.006","volume":"16","author":"H Chen","year":"2015","unstructured":"Chen H, Lou W (2015) On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob Comput (PMC) 16:36\u201350","journal-title":"Pervasive Mob Comput (PMC)"},{"issue":"7","key":"949_CR12","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1109\/TPDS.2011.260","volume":"23","author":"Y Li","year":"2012","unstructured":"Li Y, Ren J, Wu J (2012) Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Trans Parallel Distrib Syst (TPDS) 23(7):1302\u20131311","journal-title":"IEEE Trans Parallel Distrib Syst (TPDS)"},{"key":"949_CR13","doi-asserted-by":"crossref","unstructured":"Kamat P et al (2005) Enhancing source-Location privacy in sensor network routing. In: IEEE international conference distributed computing systems (ICDCS 2005), pp 599\u2013608","DOI":"10.1109\/ICDCS.2005.31"},{"key":"949_CR14","doi-asserted-by":"crossref","first-page":"3863","DOI":"10.1002\/cpe.3075","volume":"27","author":"L Yao","year":"2015","unstructured":"Yao L et al (2015) Protecting source\u2013location privacy based on multirings in wireless sensor networks. Concurr Comput Pract Exp 27:3863\u20133876","journal-title":"Concurr Comput Pract Exp"},{"key":"949_CR15","unstructured":"Ren J, Tang D (2011) Combining source-location privacy and routing efficiency in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM 2011), pp 1\u20135"},{"issue":"10","key":"949_CR16","doi-asserted-by":"crossref","first-page":"1603","DOI":"10.1093\/comjnl\/bxr055","volume":"54","author":"R Rios","year":"2011","unstructured":"Rios R, Lopez J (2011) Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput J 54(10):1603\u20131615","journal-title":"Comput J"},{"key":"949_CR17","doi-asserted-by":"crossref","unstructured":"Lightfoot L, Li Y, Ren J (2010) Preserving source-location privacy in wireless sensor network using STaR routing. In: IEEE global telecommunications conference (GLOBECOM 2010), pp 1\u20135","DOI":"10.1109\/GLOCOM.2010.5683603"},{"key":"949_CR18","doi-asserted-by":"crossref","unstructured":"Yao J, Wen G (2008) Preserving source-location privacy in energy-constrained wireless sensor networks. In: IEEE international conference distributed computing systems (ICDCS2008), pp 412\u2013416","DOI":"10.1109\/ICDCS.Workshops.2008.42"},{"issue":"2","key":"949_CR19","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMC.2011.32","volume":"11","author":"K Mehta","year":"2012","unstructured":"Mehta K, Liu D, Wright M (2012) Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans Mob Comput (TMC) 11(2):320\u2013336","journal-title":"IEEE Trans Mob Comput (TMC)"},{"issue":"2","key":"949_CR20","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TMC.2011.267","volume":"12","author":"B Alomair","year":"2013","unstructured":"Alomair B et al (2013) Toward a statistical framework for source anonymity in sensor networks. IEEE Trans Mob Comput (TMC) 12(2):248\u2013260","journal-title":"IEEE Trans Mob Comput (TMC)"},{"key":"949_CR21","doi-asserted-by":"crossref","unstructured":"Shao M et al (2008) towards statistically strong source anonymity for sensor networks. In: IEEE international conference on computer communications (INFOCOM 2008), pp 51\u201355","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"949_CR22","doi-asserted-by":"crossref","unstructured":"Zhang Y et al (2010) All proxy scheme for event source anonymity in wireless sensor networks. In: IEEE international conference on intelligent sensors, sensor networks and information processing (ISSNIP 2010), pp 263\u2013268","DOI":"10.1109\/ISSNIP.2010.5706759"},{"key":"949_CR23","doi-asserted-by":"crossref","unstructured":"Jhumka A, Bradbury M, Leeke M (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: IEEE international conference on trust, security and privacy in computing and communications (TrustCom 2012), pp 760\u2013768","DOI":"10.1109\/TrustCom.2012.281"},{"key":"949_CR24","doi-asserted-by":"crossref","unstructured":"Ortolani S et al (2011) Events privacy in WSNs: a new model and its application. In: IEEE international symposium world of wireless, mobile and multimedia networks (WoWMoM 2011), pp 1\u20139","DOI":"10.1109\/WoWMoM.2011.5986491"},{"key":"949_CR25","doi-asserted-by":"crossref","unstructured":"Thomason A et al (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: IEEE international conference on trust, security and privacy in computing and communications (TrustCom 2013), pp 667\u2013674","DOI":"10.1109\/TrustCom.2013.81"},{"issue":"10","key":"949_CR26","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TPDS.2011.302","volume":"23","author":"MM Mahmoud","year":"2012","unstructured":"Mahmoud MM, Shen X (2012) A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(10):1805\u20131818","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"949_CR27","doi-asserted-by":"crossref","unstructured":"Mahmoud ME, Shen X (2012) Secure and efficient source location privacy-preserving scheme for wireless sensor networks. In: IEEE international conference on communications (ICC2012), pp 1123\u20131127","DOI":"10.1109\/ICC.2012.6363763"},{"issue":"2","key":"949_CR28","first-page":"23","volume":"48","author":"M Guo","year":"2015","unstructured":"Guo M et al (2015) In-network trajectory privacy preservation. ACM Comput Surv (CSUR) 48(2):23\u201329","journal-title":"ACM Comput Surv (CSUR)"},{"key":"949_CR29","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1016\/j.procs.2015.07.486","volume":"57","author":"PK Roy","year":"2015","unstructured":"Roy PK et al (2015) Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Comput Sci 57:936\u2013941","journal-title":"Procedia Comput Sci"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0949-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-016-0949-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0949-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:04:12Z","timestamp":1498338252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-016-0949-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,20]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["949"],"URL":"https:\/\/doi.org\/10.1007\/s00779-016-0949-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,20]]}}}