-
1
-
-
84871762392
-
On source anonymity in wireless sensor networks
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "On Source Anonymity in Wireless Sensor Networks, " Proc. IEEE/IFIP 40th Int'l Conf. Dependable Systems and Networks (DSN '10), 2010.
-
(2010)
Proc. IEEE/IFIP 40th Int'l Conf. Dependable Systems and Networks (DSN '10)
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
2
-
-
79551633151
-
Statistical framework for source anonymity in sensor networks
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Statistical Framework for Source Anonymity in Sensor Networks, " Proc. IEEE GlobeCom, 2010.
-
(2010)
Proc. IEEE GlobeCom
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
3
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey, " Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
33745217624
-
A survey of applications of wireless sensors and wireless sensor networks
-
T. Arampatzis, J. Lygeros, and S. Manesis, "A Survey of Applications of Wireless Sensors and Wireless Sensor Networks, " Proc. IEEE 13th Mediterranean Conf. Control and Automation (MED '05), pp. 719-724, 2006.
-
(2006)
Proc IEEE 13th Mediterranean Conf. Control and Automation (MED '05)
, pp. 719-724
-
-
Arampatzis, T.1
Lygeros, J.2
Manesis, S.3
-
5
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal, "Wireless Sensor Network Survey, " Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
7
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security Protocols for Sensor Networks, " Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
8
-
-
33750699594
-
HIGHT: A new block cipher suitable for low-resource device
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "HIGHT: A New Block Cipher Suitable for Low-Resource Device, " Proc. Eighth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 46-59, 2006. (Pubitemid 44700048)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4249
, pp. 46-59
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lim, J.4
Lee, S.5
Koo, B.-S.6
Lee, C.7
Chang, D.8
Lee, J.9
Jeong, K.10
Kim, H.11
Kim, J.12
Chee, S.13
-
9
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An Ultra-Lightweight Block Cipher, " Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 450-466, 2007.
-
(2007)
Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07)
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.6
Seurin, Y.7
Vikkelsoe, C.8
-
10
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, and M. Wright, "Location Privacy in Sensor Networks against a Global Eavesdropper, " Proc. IEEE 15th Int'l Conf. Network Protocols (ICNP '07), pp. 314-323, 2007.
-
(2007)
Proc. IEEE 15th Int'l Conf. Network Protocols (ICNP '07)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
11
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks, " Proc. IEEE INFOCOM, pp. 466-474, 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 466-474
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
12
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source-Location Privacy in Sensor Network Routing, " Proc. IEEE 25th Int'l Conf. Distributed Computing Systems (ICDCS '05), pp. 599-608, 2005.
-
(2005)
Proc. IEEE 25th Int'l Conf. Distributed Computing Systems (ICDCS '05)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
13
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy-Constrained Sensor Network Routing, " Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 88-93, 2004.
-
(2004)
Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
14
-
-
84555170941
-
Entrapping adversaries for source protection in sensor networks
-
Y. Ouyang, Z. Le, G. Chen, J. Ford, F. Makedon, and U. Lowell, "Entrapping Adversaries for Source Protection in Sensor Networks, " Proc. IEEE Seventh Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WOWMOM '06), pp. 32-41, 2006.
-
(2006)
Proc. IEEE Seventh Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WOWMOM '06)
, pp. 32-41
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
Lowell, U.6
-
15
-
-
77952828413
-
CLEAR: A confidential and lifetime-aware routing protocol for wireless sensor network
-
X. Wang, X. Li, Z. Wan, and M. Gu, "CLEAR: A Confidential and Lifetime-Aware Routing Protocol for Wireless Sensor Network, " Proc. IEEE 20th Ann. Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '09), pp. 2265-2269, 2009.
-
(2009)
Proc. IEEE 20th Ann. Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '09)
, pp. 2265-2269
-
-
Wang, X.1
Li, X.2
Wan, Z.3
Gu, M.4
-
16
-
-
77953302309
-
Source-location privacy through dynamic routing in wireless sensor networks
-
Y. Li and J. Ren, "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks, " Proc. IEEE INFOCOM, pp. 1-9, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Li, Y.1
Ren, J.2
-
17
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks, " Proc. IEEE 20th Int'l Parallel & Distributed Processing Symp. (IPDPS '06), pp. 1-8, 2006.
-
(2006)
Proc. IEEE 20th Int'l Parallel & Distributed Processing Symp. (IPDPS '06)
, pp. 1-8
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
19
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks, " Proc. First ACM Conf. Wireless Network Security (WiSec '08), pp. 77-88, 2008.
-
(2008)
Proc. First. ACM Conf. Wireless Network Security (WiSec '08)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
20
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
N. Li, N. Zhang, S. Das, and B. Thuraisingham, "Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey, " Elsevier J. Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.
-
(2009)
Elsevier J. Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.3
Thuraisingham, B.4
-
21
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
H. Wang, B. Sheng, and Q. Li, "Privacy-Aware Routing in Sensor Networks, " Elsevier J. Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009.
-
(2009)
Elsevier J. Computer Networks
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
22
-
-
70449584521
-
Cross-layer enhanced source location privacy in sensor networks
-
M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, and T. La Porta, "Cross-Layer Enhanced Source Location Privacy in Sensor Networks, " Proc. IEEE Comm. Soc. Sixth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 324-332, 2009.
-
(2009)
Proc. IEEE Comm. Soc. Sixth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09)
, pp. 324-332
-
-
Shao, M.1
Hu, W.2
Zhu, S.3
Cao, G.4
Krishnamurthy, S.5
La Porta, T.6
-
23
-
-
77749271080
-
Query privacy in wireless sensor networks
-
B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, "Query Privacy in Wireless Sensor Networks, " ACM Trans. Sensor Networks, vol. 6, no. 2, pp. 1-34, 2010.
-
(2010)
ACM Trans. Sensor Networks
, vol.6
, Issue.2
, pp. 1-34
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
24
-
-
79952798742
-
Random-walk based approach to detect clone attacks in wireless sensor networks
-
June
-
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks, " IEEE J. Selected Areas in Comm., vol. 28, no. 5, pp. 677-691, June 2010.
-
(2010)
IEEE J. Selected Areas in Comm
, vol.28
, Issue.5
, pp. 677-691
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
25
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic Encryption, " J. Computer and System Sciences, vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
26
-
-
0000923503
-
Asymptotic theory of certain 'goodness of fit' criteria based on stochastic processes
-
T. Anderson and D. Darling, "Asymptotic Theory of Certain 'Goodness of Fit' Criteria Based on Stochastic Processes, " The Annals of Math. Statistics, vol. 23, no. 2, pp. 193-212, 1952.
-
(1952)
The Annals of Math. Statistics
, vol.23
, Issue.2
, pp. 193-212
-
-
Anderson, T.1
Darling, D.2
-
27
-
-
84941871856
-
The kolmogorov-smirnov test for goodness of fit
-
F. Massey Jr., "The Kolmogorov-Smirnov Test for Goodness of Fit, " J. Am. Statistical Assoc., vol. 46, no. 253, pp. 68-78, 1951.
-
(1951)
J. Am. Statistical Assoc
, vol.46
, Issue.253
, pp. 68-78
-
-
Massey Jr., F.1
-
28
-
-
0002437730
-
A test for normality of observations and regression residuals
-
C. Jarque and A. Bera, "A Test for Normality of Observations and Regression Residuals, " Int'l Statistical Rev./Revue Internationale de Statistique, vol. 55, no. 2, pp. 163-172, 1987.
-
(1987)
Int'l Statistical Rev./Revue Internationale de Statistique
, vol.55
, Issue.2
, pp. 163-172
-
-
Jarque, C.1
Bera, A.2
-
32
-
-
72849129268
-
Sink-anonymity mobility control in wireless sensor networks
-
Q. Gu, X. Chen, Z. Jiang, and J. Wu, "Sink-Anonymity Mobility Control in Wireless Sensor Networks, " Proc. IEEE Fifth Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '09), pp. 36-41, 2009.
-
(2009)
Proc. IEEE Fifth Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '09)
, pp. 36-41
-
-
Gu, Q.1
Chen, X.2
Jiang, Z.3
Wu, J.4
-
33
-
-
70349501453
-
Tracking anonymous sinks in wireless sensor networks
-
E. Shakshuki, T. Sheltami, N. Kang, and X. Xing, "Tracking Anonymous Sinks in Wireless Sensor Networks, " Proc. IEEE 23rd Int'l Conf. Advanced Information Networking and Applications (AINA '09), pp. 510-516, 2009.
-
(2009)
Proc. IEEE 23rd Int'l Conf. Advanced Information Networking and Applications (AINA '09)
, pp. 510-516
-
-
Shakshuki, E.1
Sheltami, T.2
Kang, N.3
Xing, X.4
-
37
-
-
34548355193
-
Location-aware security services for wireless sensor networks using network coding
-
DOI 10.1109/INFCOM.2007.146, 4215728, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
E. Ayday, F. Delgosha, and F. Fekri, "Location-aware Security Services for Wireless Sensor Networks Using Network Coding, " Proc. IEEE INFOCOM, pp. 1226-1234, 2007. (Pubitemid 47334346)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1226-1234
-
-
Ayday, E.1
Delgosha, F.2
Fekri, F.3
-
38
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding, " Proc. IEEE INFOCOM, pp. 19-25, 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 19-25
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
39
-
-
70449529634
-
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
-
Y. Jiang, Y. Fan, X. Shen, and C. Lin, "A Self-Adaptive Probabilistic Packet Filtering Scheme against Entropy Attacks in Network Coding, " Computer Networks, vol. 53, no. 18, pp. 3089-3101, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.18
, pp. 3089-3101
-
-
Jiang, Y.1
Fan, Y.2
Shen, X.3
Lin, C.4
-
40
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, " Comm. ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
41
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing, " IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE J. Selected Areas in Comm
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
42
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking, " Proc. ACM MobiSys, pp. 31-42, 2003.
-
(2003)
Proc. ACM MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
43
-
-
84950622021
-
EDF Statistics for goodness of fit and some comparisons
-
M. Stephens, "EDF Statistics for Goodness of Fit and Some Comparisons, " J. Am. Statistical Assoc., vol. 69, no. 347, pp. 730-737, 1974.
-
(1974)
J. Am. Statistical Assoc
, vol.69
, Issue.347
, pp. 730-737
-
-
Stephens, M.1
-
45
-
-
67649494461
-
PDCS: Security and privacy support for data-centric sensor networks
-
Aug
-
M. Shao, S. Zhu, W. Zhang, G. Cao, and Y. Yang, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks, " IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.8
, pp. 1023-1038
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
Yang, Y.5
-
47
-
-
70249120775
-
Source location privacy against laptop-class attacks in sensor networks
-
Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, "Source Location Privacy against Laptop-Class Attacks in Sensor Networks, " Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08), pp. 1-10, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08)
, pp. 1-10
-
-
Ouyang, Y.1
Le, Z.2
Liu, D.3
Ford, J.4
Makedon, F.5
-
48
-
-
63749088253
-
Source location anonymity for sensor networks
-
A. Abbasi, A. Khonsari, and M. Talebi, "Source Location Anonymity for Sensor Networks, " Proc. IEEE Sixth Conf. Consumer Comm. and Networking Conf. (CCNC '09), pp. 588-592, 2009.
-
(2009)
Proc. IEEE Sixth Conf. Consumer Comm. and Networking Conf. (CCNC '09)
, pp. 588-592
-
-
Abbasi, A.1
Khonsari, A.2
Talebi, M.3
|