-
1
-
-
85037175440
-
Wireless sensor network security: A survey
-
Leipzig, Germany: Auerbach Publications
-
J.Walters, Z. Liang,W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," in Security in Distributed, Grid, and Pervasive Computing. Leipzig, Germany: Auerbach Publications, 2007, pp. 367-409.
-
(2007)
Security in Distributed, Grid, and Pervasive Computing
, pp. 367-409
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
2
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
Jun
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," in Proc. ICDCS 25th IEEE Int. Conf. Distributed Comput. Syst., Jun. 2005, pp. 599-608.
-
(2005)
Proc. ICDCS 25th IEEE Int. Conf. Distributed Comput. Syst
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
3
-
-
14844303406
-
Source-location privacy in energyconstrained sensor network routing
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energyconstrained sensor network routing," in Proc. 2nd SASN ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 88-93.
-
(2004)
Proc. 2nd SASN ACM Workshop Security Ad Hoc Sensor Netw
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
4
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Oct
-
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. IEEE ICNP, Oct. 2007, pp. 314-323.
-
(2007)
Proc. IEEE ICNP
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
5
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
Dec
-
A. A. Nezhad, A. Miri, and D. Makrakis, "Location privacy and anonymity preserving routing for wireless sensor networks," Comput. Netw., vol. 52, no. 18, pp. 3433-3452, Dec. 2008.
-
(2008)
Comput. Netw
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
6
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Comput. Netw., vol. 53, no. 9, pp. 1512-1529, 2009.
-
(2009)
Comput. Netw
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
8
-
-
0000320829
-
The right to privacy
-
Dec [Online]. Available
-
S. Warren and L. Brandeis, "The right to privacy," Harvard Law Rev., vol. IV, no. 5, pp. 193-220, Dec. 1890 [Online]. Available: http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy?brand? warr2.html
-
(1890)
Harvard Law Rev
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.2
-
9
-
-
84876802292
-
-
Aug [Online]. Available
-
A. Pfitzmann and M. Hansen. (2010, Aug.). A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, v0.34 [Online]. Available: http://dud.inf.tu-dresden.de/literatur/Anon?Terminology?v0.34.pdf
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
, vol.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
10
-
-
84876793143
-
-
Anonymizer Inc May [Online] Available
-
Anonymizer, Inc. (2011, May). Hide IP and Anonymous Web Browsing Software [Online]. Available: http://www.anonymizer.com
-
(2011)
Hide IP and Anonymous Web Browsing Software
-
-
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
12
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. Selected Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE J. Selected Areas Commun
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
13
-
-
85084161366
-
Tor: The secondgeneration onion router
-
Aug
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," in Proc. 13th Conf. USENIX SSYM, Aug. 2004, pp. 21-21.
-
(2004)
Proc. 13th Conf. USENIX SSYM
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. Reiter and A. Rubin, "Crowds: Anonymity for web transactions," ACM Trans. Inform. Syst. Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Inform. Syst. Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
15
-
-
0036312325
-
Hordes: A multicast based protocol for anonymity
-
B. N. Levine and C. Shields, "Hordes: A multicast based protocol for anonymity," J. Comput. Secur., vol. 10, no. 3, pp. 213-240, 2002. (Pubitemid 34814465)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
16
-
-
35248893039
-
GAP: Practical anonymous networking
-
Proc. PET Mar
-
K. Bennett and C. Grothoff, "GAP: Practical anonymous networking," in Proc. PET, LNCS 2760. Mar. 2003, pp. 141-160.
-
(2003)
LNCS
, vol.2760
, pp. 141-160
-
-
Bennett, K.1
Grothoff, C.2
-
17
-
-
0023861309
-
Dining cryptographers problem: unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988. (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
18
-
-
4944262982
-
-
Cornell Univ., Ithaca, NY, Tech. Rep. 2003-1890, Feb
-
S. Goel, M. Robson, M. Polte, and E. G. Sirer, "Herbivore: A scalable and efficient protocol for anonymous communication," Cornell Univ., Ithaca, NY, Tech. Rep. 2003-1890, Feb. 2003.
-
(2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
19
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
Jul-Aug
-
S. Pai, S. Bermudez, S. Wicker, M. Meingast, T. Roosta, S. Sastry, and D. Mulligan, "Transactional confidentiality in sensor networks," IEEE Security Privacy, vol. 6, no. 4, pp. 28-35, Jul.-Aug. 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Bermudez, S.2
Wicker, S.3
Meingast, M.4
Roosta, T.5
Sastry, S.6
Mulligan, D.7
-
20
-
-
85027953695
-
Secure localization with attack detection in wireless sensor networks
-
W. Zhu, Y. Xiang, J. Zhou, R. Deng, and F. Bao, "Secure localization with attack detection in wireless sensor networks," Int. J. Inform. Security, vol. 10, pp. 155-171, 2011.
-
(2011)
Int. J. Inform. Security
, vol.10
, pp. 155-171
-
-
Zhu, W.1
Xiang, Y.2
Zhou, J.3
Deng, R.4
Bao, F.5
-
21
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
S. Misra and G. Xue, "Efficient anonymity schemes for clustered wireless sensor networks," Int. J. Sensor Netw., vol. 1, no. 1, pp. 50-63, 2006.
-
(2006)
Int. J. Sensor Netw
, vol.1
, Issue.1
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
22
-
-
52249090009
-
Providing anonymity in wireless sensor networks
-
Jul
-
Y. Ouyang, Z. Le, Y. Xu, N. Triandopoulos, S. Zhang, J. Ford, and F. Makedon, "Providing anonymity in wireless sensor networks," in Proc. IEEE Int. Conf. Pervasive Services, Jul. 2007, pp. 145-148.
-
(2007)
Proc. IEEE Int. Conf. Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le, Z.2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
23
-
-
79960880538
-
Maintaining source privacy under eavesdropping and node compromise attacks
-
Apr
-
K. Pongaliur and L. Xiao, "Maintaining source privacy under eavesdropping and node compromise attacks," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1656-1664.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1656-1664
-
-
Pongaliur, K.1
Xiao, L.2
-
24
-
-
70449584521
-
Cross-layer enhanced source location privacy in sensor networks
-
Jun
-
M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, and T. La Porta, "Cross-layer enhanced source location privacy in sensor networks," in Proc. IEEE Conf. SECON, Jun. 2009, pp. 1-9.
-
(2009)
Proc. IEEE Conf. SECON
, pp. 1-9
-
-
Shao, M.1
Hu, W.2
Zhu, S.3
Cao, G.4
Krishnamurthy, S.5
La Porta, T.6
-
25
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
DOI 10.1016/j.pmcj.2005.12.003, PII S1574119205000726, Security in Wireless Mobile Computing Systems
-
J. Deng, R. Han, and S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Pervasive Mobile Comput., vol. 2, no. 2, pp. 159-186, 2006. (Pubitemid 43243857)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
26
-
-
55149095912
-
A novel scheme for protecting receiver's location privacy in wireless sensor networks
-
Oct
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3769-3779, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.10
, pp. 3769-3779
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
27
-
-
33845942290
-
Entrapping adversaries for source protection in sensor networks
-
Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, "Entrapping adversaries for source protection in sensor networks," in Proc. Int. Symp. WOWMOM, 2006, pp. 23-34.
-
(2006)
Proc. Int. Symp. WOWMOM
, pp. 23-34
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
-
28
-
-
79551649009
-
Preserving source-location privacy in wireless sensor network using star routing
-
L. Lightfoot, Y. Li, and J. Ren, "Preserving source-location privacy in wireless sensor network using star routing," in Proc. GLOBECOM, 2010, pp. 1-5.
-
(2010)
Proc. GLOBECOM
, pp. 1-5
-
-
Lightfoot, L.1
Li, Y.2
Ren, J.3
-
29
-
-
79958205953
-
On the use of fake sources for source location privacy: Trade-offs between energy and privacy
-
A. Jhumka, M. Leeke, and S. Shrestha, "On the use of fake sources for source location privacy: Trade-offs between energy and privacy," Comput. J., vol. 54, no. 6, pp. 860-874, 2011.
-
(2011)
Comput. J
, vol.54
, Issue.6
, pp. 860-874
-
-
Jhumka, A.1
Leeke, M.2
Shrestha, S.3
-
30
-
-
80052215360
-
Maelstrom: Receiverlocation preserving in wireless sensor networks
-
Wireless Algorithms, Systems, and Applications Berlin/Heidelberg, Germany: Springer [Online]. Available
-
S. Chang, Y. Qi, H. Zhu, M. Dong, and K. Ota, "Maelstrom: Receiverlocation preserving in wireless sensor networks," in Wireless Algorithms, Systems, and Applications, LNCS 6843. Berlin/Heidelberg, Germany: Springer, 2011, pp. 190-201 [Online]. Available: http://dx.doi.org/10. 1007/978-3-642-23490-3?17
-
(2011)
LNCS
, vol.6843
, pp. 190-201
-
-
Chang, S.1
Qi, Y.2
Zhu, H.3
Dong, M.4
Ota, K.5
-
31
-
-
80052727741
-
Events privacy in WSNs: A new model and its application
-
Jun
-
S. Ortolani, M. Conti, B. Crispo, and R. Di Pietro, "Events privacy in WSNs: A new model and its application," in Proc. IEEE Int. Symp. WoWMoM, Jun. 2011, pp. 1-9.
-
(2011)
Proc. IEEE Int. Symp. WoWMoM
, pp. 1-9
-
-
Ortolani, S.1
Conti, M.2
Crispo, B.3
Di Pietro, R.4
-
32
-
-
56749163645
-
Toward event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Toward event source unobservability with minimum network traffic in sensor networks," in Proc. 1st ACM Conf. WiSec, 2008, pp. 77-88.
-
(2008)
Proc. 1st ACM Conf. WiSec
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
33
-
-
51349086896
-
Toward statistically strong source anonymity for sensor networks
-
Apr
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Toward statistically strong source anonymity for sensor networks," in Proc. 27th IEEE Conf. Comput. Commun. INFOCOM, Apr. 2008, pp. 466-474.
-
(2008)
Proc. 27th IEEE Conf. Comput. Commun. INFOCOM
, pp. 466-474
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
34
-
-
79551633151
-
Statistical framework for source anonymity in sensor networks
-
Dec
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Statistical framework for source anonymity in sensor networks," in Proc. GLOBECOM IEEE Global Telecommun. Conf., Dec. 2010, pp. 1-6.
-
(2010)
Proc. GLOBECOM IEEE Global Telecommun. Conf
, pp. 1-6
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
35
-
-
84865583954
-
Concealing of the sink location in WSNs by artificially homogenizing traffic intensity
-
B. Ying, J. R. Gallardo, D. Makrakis, and H. T. Mouftah, "Concealing of the sink location in WSNs by artificially homogenizing traffic intensity," in Proc. 1st Int. Workshop Security Comput., Network. Commun., 2011, pp. 1005-1010.
-
(2011)
Proc. 1st Int. Workshop Security Comput., Network. Commun
, pp. 1005-1010
-
-
Ying, B.1
Gallardo, J.R.2
Makrakis, D.3
Mouftah, H.T.4
-
36
-
-
55349144528
-
Network level privacy for wireless sensor networks
-
Sep
-
R. Shaikh, H. Jameel, B. d'Auriol, S. Lee, Y.-J. Song, and H. Lee, "Network level privacy for wireless sensor networks," in Proc. ISIAS. Fourth Int. Conf. Inform. Assurance Security., Sep. 2008, pp. 261-266.
-
(2008)
Proc. ISIAS. Fourth Int. Conf. Inform. Assurance Security
, pp. 261-266
-
-
Shaikh, R.1
Jameel, H.2
D'Auriol, B.3
Lee, S.4
Song, Y.-J.5
Lee, H.6
|