메뉴 건너뛰기




Volumn 54, Issue 10, 2011, Pages 1603-1615

Exploiting context-awareness to enhance source-location privacy in wireless sensor networks

Author keywords

context awareness; location privacy; wireless sensor networks

Indexed keywords

CONTEXT-AWARE; CONTEXT-AWARENESS; DATA ROUTING; ENERGY EFFICIENT; HIGH COSTS; LOCATION PRIVACY; MESSAGE DELIVERY; MOBILE ADVERSARY; PRIVACY PRESERVING; PRIVACY PROTECTION; PROTECTION LEVEL; SHORTEST-PATH; SIMULATION EXPERIMENTS; SOURCE NODES; SOURCE-LOCATION PRIVACY; TRANSMIT DATA; WIRELESS SENSOR;

EID: 80053515818     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr055     Document Type: Article
Times cited : (33)

References (28)
  • 1
    • 80053492006 scopus 로고    scopus 로고
    • Libelium
    • (Last accessed on January 2011
    • Libelium (2010) Waspmote - sensor boards. http://www. libelium.com/products/waspmote/sensors. (Last accessed on January 2011).
    • (2010) Waspmote - sensor boards
  • 3
    • 51249113844 scopus 로고    scopus 로고
    • A source- location privacy protocol in WSN based on locational angle
    • Beijing, May 19-23. IEEE Communications Society
    • Wei-Ping, W., Liang, C. and Jian-Xin, W. (2008) A Source- Location Privacy Protocol in WSN Based on Locational Angle. IEEE Int. Conf. Communications, Beijing, May 19-23, pp. 1630-1634. IEEE Communications Society.
    • (2008) IEEE Int. Conf. Communications , pp. 1630-1634
    • Wei-Ping, W.1    Liang, C.2    Jian-Xin, W.3
  • 4
    • 33746086383 scopus 로고    scopus 로고
    • Distributed user access control in sensor networks
    • Gibbons, P., Abdelzaher, T., Aspnes, J. and Rao, R. (eds), San Francisco, CA, USA, June 18-20, Lecture Notes in Computer Science 4026 Springer, Berlin
    • Wang, H. and Li, Q. (2006) Distributed User Access Control in Sensor Networks. In Gibbons, P., Abdelzaher, T., Aspnes, J. and Rao, R. (eds) Distributed Computing in Sensor Systems, San Francisco, CA, USA, June 18-20, Lecture Notes in Computer Science 4026, pp. 305-320. Springer, Berlin.
    • (2006) Distributed Computing in Sensor Systems , pp. 305-320
    • Wang, H.1    Li, Q.2
  • 5
    • 77952326880 scopus 로고    scopus 로고
    • Improved robust user authentication scheme for wireless sensor networks
    • Allahabad, India, December 15-19. IEEE Press Piscataway, NJ, USA
    • Vaidya, B., Chen, M. and Rodrigues, J.J.P.C. (2009) Improved Robust User Authentication Scheme for Wireless Sensor Networks. IEEE Conf. Wireless Communication and Sensor Networks, Allahabad, India, December 15-19, pp. 33-38. IEEE Press Piscataway, NJ, USA.
    • (2009) IEEE Conf. Wireless Communication and Sensor Networks , pp. 33-38
    • Vaidya, B.1    Chen, M.2    Rodrigues, J.J.P.C.3
  • 6
    • 14844303406 scopus 로고    scopus 로고
    • Source-location privacy in energy-constrained sensor network routing
    • Washington, DC, USA, October 25-29 ACM New York, USA
    • Ozturk, C., Zhang, Y. and Trappe, W. (2004) Source-Location Privacy in Energy-Constrained Sensor Network Routing. Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, October 25-29, pp. 88-93. ACM New York, USA.
    • (2004) Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks , pp. 88-93
    • Ozturk, C.1    Zhang, Y.2    Trappe, W.3
  • 7
    • 27944449345 scopus 로고    scopus 로고
    • Enhancing source-location privacy in sensor network routing
    • Columbus, OH, USA, June 6-10. IEEE Computer Society, Washington, DC, USA
    • Kamat, P., Zhang,Y.,Trappe,W. and Ozturk, C. (2005) Enhancing Source-Location Privacy in Sensor Network Routing. 25th IEEE Int. Conf. Distributed Computing Systems, Columbus, OH, USA, June 6-10, pp. 599-608. IEEE Computer Society, Washington, DC, USA.
    • (2005) 25th IEEE Int. Conf. Distributed Computing Systems , pp. 599-608
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 8
    • 33847141964 scopus 로고    scopus 로고
    • Preserving source location privacy in monitoring-based wireless sensor networks
    • Rhodes Island, Greece, April 25-29 IEEE Computer Society,Washington, DC, USA
    • Xi, Y., Schwiebert, L. and Shi, W. (2006) Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. 20th Int. Parallel and Distributed Processing Symposium, Rhodes Island, Greece, April 25-29, pp. 355-355. IEEE Computer Society,Washington, DC, USA.
    • (2006) 20th Int. Parallel and Distributed Processing Symposium , pp. 355-355
    • Xi, Y.1    Schwiebert, L.2    Shi, W.3
  • 9
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • Wang, H., Sheng, B. and Li, Q. (2009) Privacy-aware routing in sensor networks. Comput. Netw., 53, 1512-1529.
    • (2009) Comput. Netw. , vol.53 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 10
    • 33845942290 scopus 로고    scopus 로고
    • Entrapping adversaries for source protection in sensor networks
    • Niagara-Falls, Buffalo, NY, USA, June 26-29, IEEE Computer Society, Washington, DC, USA
    • Ouyang, Y., Le, Z., Chen, G., Ford, J. and Makedon, F. (2006) Entrapping Adversaries for Source Protection in Sensor Networks. Proc. 2006 Int. Symp. World of Wireless, Mobile and Multimedia Networks, Niagara-Falls, Buffalo, NY, USA, June 26-29, pp. 23-34. IEEE Computer Society, Washington, DC, USA.
    • (2006) Proc. 2006 Int. Symp. World of Wireless, Mobile and Multimedia Networks , pp. 23-34
    • Ouyang Y. Le, Z.1    Chen, G.2    Ford, J.3    Makedon, F.4
  • 12
    • 34547614424 scopus 로고    scopus 로고
    • An RF-Based system for tracking transceiver-free objects
    • White Plains, New York, USA, March 19-23. IEEE Computer Society,Washington, DC, USA
    • Zhang, D., Ma, J., Chen, Q. and Ni, L.M. (2007) An RF-Based System for Tracking Transceiver-free Objects. Fifth Annual IEEE Int. Conf. Pervasive Computing and Communications, White Plains, New York, USA, March 19-23, pp. 135-144. IEEE Computer Society,Washington, DC, USA.
    • (2007) Fifth Annual IEEE Int. Conf. Pervasive Computing and Communications , pp. 135-144
    • Zhang, D.1    Ma, J.2    Chen, Q.3    Ni, L.M.4
  • 13
    • 77949875012 scopus 로고    scopus 로고
    • Radio tomographic imaging with wireless networks
    • Wilson, J. and Patwari, N. (2010) Radio tomographic imaging with wireless networks. IEEE Trans. Mob. Comput., 9, 621-632.
    • (2010) IEEE Trans. Mob. Comput. , vol.9 , pp. 621-632
    • Wilson, J.1    Patwari, N.2
  • 14
    • 52249120873 scopus 로고    scopus 로고
    • Efficient anonymity schemes for clustered wireless sensor networks
    • Misra, S. and Xue, G. (2006) Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw., 1, 50-63.
    • (2006) Int. J. Sensor Netw. , vol.1 , pp. 50-63
    • Misra, S.1    Xue, G.2
  • 15
    • 52249090009 scopus 로고    scopus 로고
    • Providing anonymity in wireless sensor networks
    • Istanbul, Turkey, July 15-20. IEEE Computer Society, Washington, DC, USA
    • Ouyang,Y., Le, Z., Xu,Y., Triandopoulos, N., Zhang, S., Ford, J. and Makedon, F. (2007) ProvidingAnonymity inWireless Sensor Networks. IEEE Int. Conf. Pervasive Services, Istanbul, Turkey, July 15-20, pp. 145-148. IEEE Computer Society, Washington, DC, USA.
    • (2007) IEEE Int. Conf. Pervasive Services , pp. 145-148
    • Ouyang, Y.1    Le, Z.2    Xu, Y.3    Triandopoulos, N.4    Zhang, S.5    Ford, J.6    Makedon, F.7
  • 18
    • 34247885928 scopus 로고    scopus 로고
    • Wireless sensor network localization techniques
    • Mao, G., Fidan, B. and Anderson, B.D. (2007) Wireless sensor network localization techniques. Comput. Netw., 51, 2529-2553.
    • (2007) Comput. Netw. , vol.51 , pp. 2529-2553
    • Mao, G.1    Fidan, B.2    Anderson, B.D.3
  • 22
    • 65849370732 scopus 로고    scopus 로고
    • Analytic evaluation of target detection in heterogeneous wireless sensor networks
    • Lazos, L., Poovendran, R. and Ritcey, J.A. (2009) Analytic evaluation of target detection in heterogeneous wireless sensor networks. ACM Trans. Sensor Netw., 5, 1-38.
    • (2009) ACM Trans. Sensor Netw. , vol.5 , pp. 1-38
    • Lazos, L.1    Poovendran, R.2    Ritcey, J.A.3
  • 23
    • 35248853846 scopus 로고    scopus 로고
    • An efficient scheme for user authentication inwireless sensor networks
    • Niagara Falls, Canada, May 21-23. IEEE Computer Society,Washington, DC, USA
    • Jiang, C., Li, B. and Xu, H. (2007) An Efficient Scheme for User Authentication inWireless Sensor Networks. Proc. 21st Int. Conf. Advanced Information Networking and ApplicationsWorkshops, Niagara Falls, Canada, May 21-23, pp. 438-442. IEEE Computer Society,Washington, DC, USA.
    • (2007) Proc. 21st Int. Conf. Advanced Information Networking and Applications Workshops , pp. 438-442
    • Jiang, C.1    Li, B.2    Xu, H.3
  • 24
    • 78049456501 scopus 로고    scopus 로고
    • A lightweight user authentication scheme forwireless sensor networks
    • Hammamet, Tunisia, May 16-19. IEEE Computer Society,Washington, DC, USA
    • Cheikhrouhou, O., Koubaa, A., Boujelben, M. and Abid, M. (2010) A Lightweight User Authentication Scheme forWireless Sensor Networks. Proc. ACS/IEEE Int. Conf. Computer Systems and Applications, Hammamet, Tunisia, May 16-19, pp. 1-7. IEEE Computer Society,Washington, DC, USA.
    • (2010) Proc. ACS/IEEE Int. Conf. Computer Systems and Applications , pp. 1-7
    • Cheikhrouhou, O.1    Koubaa, A.2    Boujelben, M.3    Abid, M.4
  • 27
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • Boston, MA, USA, August 6-11. ACM, NewYork, NY, USA
    • Karp, B. and Kung, H.T. (2000) GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. Proc. 6th Annual Int. Conf. Mobile Computing and Networking, Boston, MA, USA, August 6-11, pp. 243-254. ACM, NewYork, NY, USA.
    • (2000) Proc. 6th Annual Int. Conf. Mobile Computing and Networking , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 28
    • 1542358974 scopus 로고    scopus 로고
    • Trajectory based forwarding and its applications
    • San Diego, CA, USA, September 14-19. ACM, NewYork, NY, USA
    • Niculescu, D. and Nath, B. (2003) Trajectory Based Forwarding and its Applications. Proc. 9th Annual Int. Conf. Mobile Computing and Networking, San Diego, CA, USA, September 14-19, pp. 260-272. ACM, NewYork, NY, USA.
    • (2003) Proc. 9th Annual Int. Conf. Mobile Computing and Networking , pp. 260-272
    • Niculescu, D.1    Nath, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.