메뉴 건너뛰기




Volumn , Issue , 2010, Pages 2837-2842

A distributed query protocol for continuous privacy preserving in wireless sensor networks

Author keywords

Privacy preserving; Query protocol; Wireless sensor networks

Indexed keywords

CONTINUOUS DATA; DATA COLLECTION; DISTRIBUTED PROTOCOLS; DISTRIBUTED QUERY; EXTENSIVE SIMULATIONS; IN-NETWORK PROCESSING; LOCATION PRIVACY; PRIVACY CONCERNS; PRIVACY PRESERVING; QUERY PROTOCOL; SECURITY AND PRIVACY; WIRELESS SENSOR;

EID: 78249274258     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2010.474     Document Type: Conference Paper
Times cited : (1)

References (21)
  • 2
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46- 55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 3
    • 51349116601 scopus 로고    scopus 로고
    • Confidentiality protection for distributed sensor data aggregation
    • Phoenix AZ, USA, April
    • T. Feng, C. Wang, W. Zhang, and L. Ruan, "Confidentiality protection for distributed sensor data aggregation," in Proc. of IEEE INFOCOM'08, Phoenix AZ, USA, April 2008.
    • (2008) Proc. of IEEE INFOCOM'08
    • Feng, T.1    Wang, C.2    Zhang, W.3    Ruan, L.4
  • 4
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 6
    • 33847315663 scopus 로고    scopus 로고
    • Protecting location privacy through path confusion
    • Washington, DC, USA
    • B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in Proc. of SecureComm '05, Washington, DC, USA, 2005, pp. 194-205.
    • (2005) Proc. of SecureComm '05 , pp. 194-205
    • Hoh, B.1    Gruteser, M.2
  • 8
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • May
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," in Proc. of IEEE INFOCOM'07, May 2007.
    • (2007) Proc. of IEEE INFOCOM'07
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 9
    • 27944449345 scopus 로고    scopus 로고
    • Enhancing source-location privacy in sensor network routing
    • Washington, DC, USA
    • P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing," in Proc. of IEEE ICDCS '05, Washington, DC, USA, 2005.
    • (2005) Proc. of IEEE ICDCS '05
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 11
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and ?-diversity
    • [Online]. Available
    • N. Li and T. Li, "t-closeness: Privacy beyond k-anonymity and ?-diversity," in In Proceedings of IEEE International Conference on Data Engineering, 2007. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/ summary?doi=10.1.1.92.587.
    • (2007) Proceedings of IEEE International Conference on Data Engineering
    • Li, N.1    Li, T.2
  • 12
    • 34147182909 scopus 로고    scopus 로고
    • Learning and inferring transportation routines
    • L. Liao, D. J. Patterson, D. Fox, and H. Kautz, "Learning and inferring transportation routines," Artif. Intell., vol. 171, no. 5-6, pp. 311-331, 2007.
    • (2007) Artif. Intell. , vol.171 , Issue.5-6 , pp. 311-331
    • Liao, L.1    Patterson, D.J.2    Fox, D.3    Kautz, H.4
  • 15
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • Oct.
    • K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. of IEEE ICNP '07, Oct. 2007.
    • (2007) Proc. of IEEE ICNP '07
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 17
    • 34548302064 scopus 로고    scopus 로고
    • Pdcs: Security and privacy support for data-centric sensor networks
    • May
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pdcs: Security and privacy support for data-centric sensor networks," in Proc. of IEEE INFOCOM '07, May 2007.
    • (2007) Proc. of IEEE INFOCOM '07
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 18
    • 51349098378 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in two-tiered sensor networks
    • Phoenix AZ, USA, April
    • B. Sheng and Q. Li, "Verifiable privacy-preserving range query in two-tiered sensor networks," in Proc. of IEEE INFOCOM '08, Phoenix AZ, USA, April 2008.
    • (2008) Proc. of IEEE INFOCOM '08
    • Sheng, B.1    Li, Q.2
  • 19
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • June
    • H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Computer Networks, vol. 53, no. 9, pp. 1512-1529, June 2008.
    • (2008) Computer Networks , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 21
    • 77950246399 scopus 로고    scopus 로고
    • An optimal algorithm towards successive location privacy in sensor networks with dynamic programming
    • vol. E93.D
    • B. ZHAO, D. WANG, Z. SHAO, J. CAO, K. C. CHAN, and J. SU, "An optimal algorithm towards successive location privacy in sensor networks with dynamic programming," IEICE Transactions on Information and Systems, vol. E93.D, no. 3, pp. 531-533, 2010.
    • (2010) IEICE Transactions on Information and Systems , Issue.3 , pp. 531-533
    • Zhao, B.1    Wang, D.2    Shao, Z.3    Cao, J.4    Chan, K.C.5    Su, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.