메뉴 건너뛰기




Volumn 12, Issue 2, 2013, Pages 248-260

Toward a statistical framework for source anonymity in sensor networks

Author keywords

anonymity; coding theory; hypothesis testing; nuisance parameters; privacy; source location; Wireless sensor networks (WSN)

Indexed keywords

ANONYMITY; CODING THEORY; HYPOTHESIS TESTING; NUISANCE PARAMETER; SOURCE LOCATION;

EID: 84871814015     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2011.267     Document Type: Article
Times cited : (56)

References (48)
  • 3
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey, " Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 5
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • J. Yick, B. Mukherjee, and D. Ghosal, "Wireless Sensor Network Survey, " Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 7
  • 11
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks, " Proc. IEEE INFOCOM, pp. 466-474, 2008.
    • (2008) Proc. IEEE INFOCOM , pp. 466-474
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 16
    • 77953302309 scopus 로고    scopus 로고
    • Source-location privacy through dynamic routing in wireless sensor networks
    • Y. Li and J. Ren, "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks, " Proc. IEEE INFOCOM, pp. 1-9, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Li, Y.1    Ren, J.2
  • 20
    • 67650461985 scopus 로고    scopus 로고
    • Privacy preservation in wireless sensor networks: A state-of-the-art survey
    • N. Li, N. Zhang, S. Das, and B. Thuraisingham, "Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey, " Elsevier J. Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.
    • (2009) Elsevier J. Ad Hoc Networks , vol.7 , Issue.8 , pp. 1501-1514
    • Li, N.1    Zhang, N.2    Das, S.3    Thuraisingham, B.4
  • 21
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • H. Wang, B. Sheng, and Q. Li, "Privacy-Aware Routing in Sensor Networks, " Elsevier J. Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009.
    • (2009) Elsevier J. Computer Networks , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 24
    • 79952798742 scopus 로고    scopus 로고
    • Random-walk based approach to detect clone attacks in wireless sensor networks
    • June
    • Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks, " IEEE J. Selected Areas in Comm., vol. 28, no. 5, pp. 677-691, June 2010.
    • (2010) IEEE J. Selected Areas in Comm , vol.28 , Issue.5 , pp. 677-691
    • Zeng, Y.1    Cao, J.2    Zhang, S.3    Guo, S.4    Xie, L.5
  • 26
    • 0000923503 scopus 로고
    • Asymptotic theory of certain 'goodness of fit' criteria based on stochastic processes
    • T. Anderson and D. Darling, "Asymptotic Theory of Certain 'Goodness of Fit' Criteria Based on Stochastic Processes, " The Annals of Math. Statistics, vol. 23, no. 2, pp. 193-212, 1952.
    • (1952) The Annals of Math. Statistics , vol.23 , Issue.2 , pp. 193-212
    • Anderson, T.1    Darling, D.2
  • 27
    • 84941871856 scopus 로고
    • The kolmogorov-smirnov test for goodness of fit
    • F. Massey Jr., "The Kolmogorov-Smirnov Test for Goodness of Fit, " J. Am. Statistical Assoc., vol. 46, no. 253, pp. 68-78, 1951.
    • (1951) J. Am. Statistical Assoc , vol.46 , Issue.253 , pp. 68-78
    • Massey Jr., F.1
  • 37
    • 34548355193 scopus 로고    scopus 로고
    • Location-aware security services for wireless sensor networks using network coding
    • DOI 10.1109/INFCOM.2007.146, 4215728, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • E. Ayday, F. Delgosha, and F. Fekri, "Location-aware Security Services for Wireless Sensor Networks Using Network Coding, " Proc. IEEE INFOCOM, pp. 1226-1234, 2007. (Pubitemid 47334346)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1226-1234
    • Ayday, E.1    Delgosha, F.2    Fekri, F.3
  • 38
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding, " Proc. IEEE INFOCOM, pp. 19-25, 2009.
    • (2009) Proc. IEEE INFOCOM , pp. 19-25
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 39
    • 70449529634 scopus 로고    scopus 로고
    • A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
    • Y. Jiang, Y. Fan, X. Shen, and C. Lin, "A Self-Adaptive Probabilistic Packet Filtering Scheme against Entropy Attacks in Network Coding, " Computer Networks, vol. 53, no. 18, pp. 3089-3101, 2009.
    • (2009) Computer Networks , vol.53 , Issue.18 , pp. 3089-3101
    • Jiang, Y.1    Fan, Y.2    Shen, X.3    Lin, C.4
  • 40
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, " Comm. ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Comm. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 42
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking, " Proc. ACM MobiSys, pp. 31-42, 2003.
    • (2003) Proc. ACM MobiSys , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 43
    • 84950622021 scopus 로고
    • EDF Statistics for goodness of fit and some comparisons
    • M. Stephens, "EDF Statistics for Goodness of Fit and Some Comparisons, " J. Am. Statistical Assoc., vol. 69, no. 347, pp. 730-737, 1974.
    • (1974) J. Am. Statistical Assoc , vol.69 , Issue.347 , pp. 730-737
    • Stephens, M.1
  • 45
    • 67649494461 scopus 로고    scopus 로고
    • PDCS: Security and privacy support for data-centric sensor networks
    • Aug
    • M. Shao, S. Zhu, W. Zhang, G. Cao, and Y. Yang, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks, " IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.8 , pp. 1023-1038
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4    Yang, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.