메뉴 건너뛰기




Volumn , Issue , 2009, Pages 510-516

Tracking anonymous sinks in wireless sensor networks

Author keywords

Anonymous; Low pass filter; Sensor networks

Indexed keywords

ANONYMOUS; DATA FLOW; LOCATION PRIVACY; PACKET TRAFFIC; PHYSICAL ATTACKS; PSEUDO-NOISE CODES; SIMULATION EXPERIMENTS; SINK NODES; SOURCE NODES; TRAFFIC OVERHEAD;

EID: 70349501453     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2009.61     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 2
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiverlocation privacy in wireless sensor networks
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiverlocation privacy in wireless sensor networks", in Proc. of IEEE Infocom, pp. 1955-1963, 2007.
    • (2007) Proc. of IEEE Infocom , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 4
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • September
    • C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), September 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3
    • Karlof, C.1    Wagner, D.2
  • 12
    • 27944449345 scopus 로고    scopus 로고
    • Enhancing sourcelocation privacy in sensor network routing
    • Columbus, Ohio, USA, Jun
    • P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing", in Proc. of IEEE ICDCS, Columbus, Ohio, USA, Jun 2005.
    • (2005) Proc. of IEEE ICDCS
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 13
    • 56749163645 scopus 로고    scopus 로고
    • Towards event source unobservability with minimum network traffic in sensor networks
    • Alexandria, Virginia, USA, April
    • Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks", in Proc. of ACM WiSec, Alexandria, Virginia, USA, April 2008.
    • (2008) Proc. of ACM WiSec
    • Yang, Y.1    Shao, M.2    Zhu, S.3    Urgaonkar, B.4    Cao, G.5
  • 14
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks", in Proc. of IEEE Infocom, 2008.
    • (2008) Proc. of IEEE Infocom
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 16
    • 84958656559 scopus 로고    scopus 로고
    • Pseudorandom number generation within cryptographic algorithms: The dss case,
    • Proceedings of advances in cryptology'97, May
    • M. Bellare, S. Goldwasser, and D. Miccianciom, .Pseudorandom number generation within cryptographic algorithms: the dss case,. in Proceedings of advances in cryptology'97, Lecture Notes in Computer Science, May 1997.
    • (1997) Lecture Notes in Computer Science
    • Bellare, M.1    Goldwasser, S.2    Miccianciom, D.3
  • 19
    • 70349483461 scopus 로고    scopus 로고
    • ir.J.Meel, Spread spectrum (ss) - introduction, http://www.sssmag.com/pdf/Ss-jme-denayer-intro-print.pdf, 1999.
    • ir.J.Meel, "Spread spectrum (ss) - introduction", http://www.sssmag.com/pdf/Ss-jme-denayer-intro-print.pdf, 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.