1Song J H,Wong V W S, Leung V C M. Wireless Location PrivacyProtection in Vehicular Ad-Hoc Networks[J]. Mobile Networks &Applications, 2010,15( 1): 1-6.
2Mehta K, Liu D, Wright M. Protecting Location Privacy in SensorNetworks against a Global Eavesdropper [J], IEEE Transactionson Mobile Computing,2012,11(2):320-336.
3Na Li, Nan Zhang, Sajal K Das, et al. Privacy Preservation inWireless Sensor Networks: A State-of-the-Art Survey [J]. Ad HocNetworks,2009,7(8) : 1501-1514.
4Mahmoud M M E A, Shen X. A Cloud-Based Scheme for Protect-ing Source- Location Privacy Against Hotspot- Locating Attack inWireless Sensor Networks [J]. IEEE Transactions on Parallel &Distributed Systems,2011,23(10) : 1805-1818.
5Chaum D. Untraceable Electronic Mail, Return Addresses, andDigital Pseudonyms [J]. Communications of the Acm, 1981,24?2):211-219.
6Syverson P F,Goldschlag D M,Reed M G. Anonymous Connec-tions and Onion Routing [J].IEEE Journal on Selected Areas inCommunications, 1998,16(4) : 482-494.
7Kong J, Hong X. ANODH: ANonymous on Demand Routing withUntraceable Routes for Mobile Ad-Hoc Networks [J]. In Proceed-ings of Acm International(Mobihoc * 03) ,2003:291-302.
8Rios R, Lopez J. Exploiting Context- Awareness to EnhanceSource-Location Privacy in Wireless Sensor Networks [J]. Com-puter Journal, 2011,54(10) : 1603-1615.