메뉴 건너뛰기




Volumn , Issue , 2009, Pages 361-367

SECLOUD: Source and destination seclusion using clouds for wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXTUAL INFORMATION; DATA TRANSMISSION; DESTINATION NODES; MILITARY NETWORKS; PACKET TRANSMISSIONS; RANDOM WALK;

EID: 70449481059     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2009.5202367     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 1
    • 55649095270 scopus 로고    scopus 로고
    • Location privacy and anonymity preserving routing for wireless sensor networks
    • A. A. Nezhad, A. Miri, and D. Makrakis, "Location privacy and anonymity preserving routing for wireless sensor networks," Comput. Netw., vol. 52, no. 18, pp. 3433-3452, 2008.
    • (2008) Comput. Netw , vol.52 , Issue.18 , pp. 3433-3452
    • Nezhad, A.A.1    Miri, A.2    Makrakis, D.3
  • 3
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. of IEEE ICNP, 2007.
    • (2007) Proc. of IEEE ICNP
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 4
    • 56749163645 scopus 로고    scopus 로고
    • Towards event source unobservability with minimum network traffic in sensor networks
    • Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proc. of ACM WiSec, 2008.
    • (2008) Proc. of ACM WiSec
    • Yang, Y.1    Shao, M.2    Zhu, S.3    Urgaonkar, B.4    Cao, G.5
  • 5
    • 55149095912 scopus 로고    scopus 로고
    • A novel scheme for protecting receiver's location privacy in wireless sensor networks
    • October
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," IEEE Trans. on Wireless Comm., vol. 7, no. 10, pp. 3769-3779, October 2008.
    • (2008) IEEE Trans. on Wireless Comm , vol.7 , Issue.10 , pp. 3769-3779
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 6
    • 70449501336 scopus 로고    scopus 로고
    • Preserving source location privacy in monitoring based wireless sensor networks
    • Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring based wireless sensor networks," in Proc. of SSN, 2006.
    • (2006) Proc. of SSN
    • Xi, Y.1    Schwiebert, L.2    Shi, W.3
  • 7
  • 8
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. of IEEE INFOCOM, 2008.
    • (2008) Proc. of IEEE INFOCOM
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 9
    • 4544367290 scopus 로고    scopus 로고
    • Source-location privacy for networks of energy-constrained sensors
    • C. Ozturk, Y. Zhang, W. Trappe, and M. Ott, "Source-location privacy for networks of energy-constrained sensors," in Proc. of IEEE SEUS, 2004.
    • (2004) Proc. of IEEE SEUS
    • Ozturk, C.1    Zhang, Y.2    Trappe, W.3    Ott, M.4
  • 10
    • 33847315663 scopus 로고    scopus 로고
    • Protecting location privacy through path confusion
    • B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in Proc. of SECURECOMM, 2005.
    • (2005) Proc. of SECURECOMM
    • Hoh, B.1    Gruteser, M.2
  • 11
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless Ian through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless Ian through disposable interface identifiers: a quantitative analysis," Mob. Netw. Appl., vol. 10, no. 3, pp. 315-325, 2005.
    • (2005) Mob. Netw. Appl , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 12
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of IEEE SSP, 2003.
    • (2003) Proc. of IEEE SSP
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 13
    • 32844459414 scopus 로고    scopus 로고
    • A key predistribution scheme for sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Trans. on Dependable and Secure Comp., vol. 3, no. 1, pp. 62-77, 2006.
    • (2006) IEEE Trans. on Dependable and Secure Comp , vol.3 , Issue.1 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 14
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Y. Zhang, W. Liu, and W. Lou, "Anonymous communications in mobile ad hoc networks," in Proc. of IEEE INFOCOM, 2005.
    • (2005) Proc. of IEEE INFOCOM
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 15
    • 34347244961 scopus 로고    scopus 로고
    • An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
    • J. Kong, X. Hong, and M. Gerla, "An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks," IEEE Trans. on Mob. Comp., vol. 6, no. 8, pp. 888-902, 2007.
    • (2007) IEEE Trans. on Mob. Comp , vol.6 , Issue.8 , pp. 888-902
    • Kong, J.1    Hong, X.2    Gerla, M.3
  • 17
    • 34248678132 scopus 로고    scopus 로고
    • A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • R. Lu, Z. Cao, L. Wang, and C. Sun, "A secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Comput. Stand. Interfaces, vol. 29, no. 5, pp. 521-527, 2007.
    • (2007) Comput. Stand. Interfaces , vol.29 , Issue.5 , pp. 521-527
    • Lu, R.1    Cao, Z.2    Wang, L.3    Sun, C.4
  • 18
    • 20544471574 scopus 로고    scopus 로고
    • Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    • A. Boukerche, K. EI-Khatib, L. Xu, and L. Korba, "Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. of IEEE LCN, 2004.
    • (2004) Proc. of IEEE LCN
    • Boukerche, A.1    EI-Khatib, K.2    Xu, L.3    Korba, L.4
  • 19
    • 70449477282 scopus 로고    scopus 로고
    • Traffic analysis based unlinkability measure for ieee 802.11b-based communication systems
    • D. Huang, "Traffic analysis based unlinkability measure for ieee 802.11b-based communication systems," in Proc. ofACM WiSe, 2006.
    • (2006) Proc. ofACM WiSe
    • Huang, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.