메뉴 건너뛰기




Volumn , Issue , 2012, Pages 75-79

Privacy in machine-to-machine communications A state-of-the-art survey

Author keywords

anonymity; M2M; obfuscation; privacy

Indexed keywords

ANONYMITY; COMMUNICATION CAPABILITIES; HIGH QUALITY; INDIVIDUAL PRIVACY; INFORMATION PRIVACY; INTEGRAL PART; LOCALIZATION AND TRACKING; M2M; MACHINE-TO-MACHINE COMMUNICATIONS; OBFUSCATION; PERSONAL INFORMATION; PHYSICAL WORLD; PRIVACY PRESERVING; RAPID DEPLOYMENTS; SERVICE PROVIDER; TECHNICAL SOLUTIONS;

EID: 84873548235     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCS.2012.6406112     Document Type: Conference Paper
Times cited : (33)

References (45)
  • 2
    • 84870630391 scopus 로고    scopus 로고
    • specifications
    • Trusted Platform Module (TPM) specifications, http://www. trustedcomputinggroup.org/developers/trustedplatformmodule.
    • Trusted Platform Module (TPM)
  • 5
    • 0019532104 scopus 로고    scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, 24(2): 84-90, 1981.
    • Communications of the ACM , vol.242 , Issue.84-90 , pp. 1981
    • Chaum, D.L.1
  • 7
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed and P. Syverson, "Onion routing for anonymous and private internet connections", Communications of the ACM, 42(2): 39-41, 1999.
    • (1999) Communications of the ACM , vol.422 , Issue.39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 10
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study"
    • N. R. Adam and J. C. Worthmann, "Security-control methods for statistical databases: a comparative study", ACM Computing Surveys, 21(4): 515-556, 1989.
    • (1989) ACM Computing Surveys , vol.214 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 12
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork, "Differential Privacy", In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 13
    • 84873531880 scopus 로고    scopus 로고
    • A Presence-based GEOPRIV Location Object Format Dec
    • IETF RFC 4119, "A Presence-based GEOPRIV Location Object Format", Dec. 200"5.
    • (2005) IETF RFC 4119
  • 19
    • 38049010942 scopus 로고    scopus 로고
    • Information confinement, privacy, and security in rfid systems
    • Dec
    • R.D.Pietro and R. Molva, "Information confinement, privacy, and security in RFID systems", in proceedings of ESORICS, Pages 187-202, Dec. 2007.
    • (2007) Proceedings of ESORICS , pp. 187-202
    • Pietro, R.D.1    Molva, R.2
  • 25
  • 26
    • 84890455044 scopus 로고    scopus 로고
    • International telecommunication union
    • TU report, Nov
    • International Telecommunication Union, "The Internet of Things", ITU report, Nov. 200"5.
    • (2005) The Internet of Things
  • 32
    • 74049088801 scopus 로고    scopus 로고
    • Anonysense: Privacy-aware people-centric sensing
    • C. Cornelius, "AnonySense: Privacy-Aware People-Centric Sensing", in ACM MobiSys, 2008.
    • (2008) ACM MobiSys
    • Cornelius, C.1
  • 33
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56-64, 2003.
    • (2003) IEEE Pervasive Computing , vol.21 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 36
    • 2442539759 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environment
    • Marc Langheinrich
    • Marc Langheinrich, "A privacy awareness system for ubiquitous computing environment", in Ubicomp, 2002.
    • (2002) Ubicomp
  • 37
    • 39349100902 scopus 로고    scopus 로고
    • Protecting location privacy with dynamic mac address exchanging in wireless networks
    • Nov
    • M. Lei, X. Hong, and S. V. Vrbsky, "Protecting location privacy with dynamic MAC address exchanging in wireless networks," in Proceedings of IEEE Globecom, Nov. 2007.
    • (2007) Proceedings of IEEE Globecom
    • Lei, M.1    Hong, X.2    Vrbsky, S.V.3
  • 39
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • USENIX
    • M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking", in MobiSys, pages 31-42, USENIX, 2003.
    • (2003) MobiSys , pp. 31-2
    • Gruteser, M.1    Grunwald, D.2
  • 41
    • 78149342292 scopus 로고    scopus 로고
    • Privately querying locationbased services with sybilquery
    • P. Shankar, V. Ganapathy, and L. Iftode, "Privately querying locationbased services with sybilquery", in Ubicomp, 2009.
    • (2009) Ubicomp
    • Shankar, P.1    Ganapathy, V.2    Iftode, L.3
  • 43
    • 70450278755 scopus 로고    scopus 로고
    • Hiding stars with fireworks: Location privacy through camouflage
    • J. T. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: Location privacy through camouflage", in MobiCom, 2009.
    • (2009) MobiCom
    • Meyerowitz, J.T.1    Choudhury, R.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.