메뉴 건너뛰기




Volumn 7, Issue 2, 2013, Pages 298-310

(Un)suitability of anonymous communication systems to WSN

Author keywords

Anonymous communication; location privacy; wireless sensor networks

Indexed keywords

ANONYMOUS COMMUNICATION; ANONYMOUS COMMUNICATION SYSTEMS; LOCATION PRIVACY; PRIVACY PRESERVATION; REAL-WORLD SCENARIO; RESEARCH COMMUNITIES; SENSITIVE INFORMATIONS; TRAFFIC PATTERN;

EID: 84876786771     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2012.2221956     Document Type: Article
Times cited : (7)

References (37)
  • 4
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • Oct
    • K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. IEEE ICNP, Oct. 2007, pp. 314-323.
    • (2007) Proc. IEEE ICNP , pp. 314-323
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 5
    • 55649095270 scopus 로고    scopus 로고
    • Location privacy and anonymity preserving routing for wireless sensor networks
    • Dec
    • A. A. Nezhad, A. Miri, and D. Makrakis, "Location privacy and anonymity preserving routing for wireless sensor networks," Comput. Netw., vol. 52, no. 18, pp. 3433-3452, Dec. 2008.
    • (2008) Comput. Netw , vol.52 , Issue.18 , pp. 3433-3452
    • Nezhad, A.A.1    Miri, A.2    Makrakis, D.3
  • 6
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Comput. Netw., vol. 53, no. 9, pp. 1512-1529, 2009.
    • (2009) Comput. Netw , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 8
    • 0000320829 scopus 로고
    • The right to privacy
    • Dec [Online]. Available
    • S. Warren and L. Brandeis, "The right to privacy," Harvard Law Rev., vol. IV, no. 5, pp. 193-220, Dec. 1890 [Online]. Available: http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy?brand? warr2.html
    • (1890) Harvard Law Rev , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.1    Brandeis, L.2
  • 10
    • 84876793143 scopus 로고    scopus 로고
    • Anonymizer Inc May [Online] Available
    • Anonymizer, Inc. (2011, May). Hide IP and Anonymous Web Browsing Software [Online]. Available: http://www.anonymizer.com
    • (2011) Hide IP and Anonymous Web Browsing Software
  • 11
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 12
  • 14
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • M. Reiter and A. Rubin, "Crowds: Anonymity for web transactions," ACM Trans. Inform. Syst. Security, vol. 1, no. 1, pp. 66-92, 1998.
    • (1998) ACM Trans. Inform. Syst. Security , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.1    Rubin, A.2
  • 15
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A multicast based protocol for anonymity
    • B. N. Levine and C. Shields, "Hordes: A multicast based protocol for anonymity," J. Comput. Secur., vol. 10, no. 3, pp. 213-240, 2002. (Pubitemid 34814465)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 16
    • 35248893039 scopus 로고    scopus 로고
    • GAP: Practical anonymous networking
    • Proc. PET Mar
    • K. Bennett and C. Grothoff, "GAP: Practical anonymous networking," in Proc. PET, LNCS 2760. Mar. 2003, pp. 141-160.
    • (2003) LNCS , vol.2760 , pp. 141-160
    • Bennett, K.1    Grothoff, C.2
  • 17
    • 0023861309 scopus 로고
    • Dining cryptographers problem: unconditional sender and recipient untraceability
    • D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988. (Pubitemid 18606152)
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 20
    • 85027953695 scopus 로고    scopus 로고
    • Secure localization with attack detection in wireless sensor networks
    • W. Zhu, Y. Xiang, J. Zhou, R. Deng, and F. Bao, "Secure localization with attack detection in wireless sensor networks," Int. J. Inform. Security, vol. 10, pp. 155-171, 2011.
    • (2011) Int. J. Inform. Security , vol.10 , pp. 155-171
    • Zhu, W.1    Xiang, Y.2    Zhou, J.3    Deng, R.4    Bao, F.5
  • 21
    • 52249120873 scopus 로고    scopus 로고
    • Efficient anonymity schemes for clustered wireless sensor networks
    • S. Misra and G. Xue, "Efficient anonymity schemes for clustered wireless sensor networks," Int. J. Sensor Netw., vol. 1, no. 1, pp. 50-63, 2006.
    • (2006) Int. J. Sensor Netw , vol.1 , Issue.1 , pp. 50-63
    • Misra, S.1    Xue, G.2
  • 23
    • 79960880538 scopus 로고    scopus 로고
    • Maintaining source privacy under eavesdropping and node compromise attacks
    • Apr
    • K. Pongaliur and L. Xiao, "Maintaining source privacy under eavesdropping and node compromise attacks," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1656-1664.
    • (2011) Proc. IEEE INFOCOM , pp. 1656-1664
    • Pongaliur, K.1    Xiao, L.2
  • 25
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • DOI 10.1016/j.pmcj.2005.12.003, PII S1574119205000726, Security in Wireless Mobile Computing Systems
    • J. Deng, R. Han, and S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Pervasive Mobile Comput., vol. 2, no. 2, pp. 159-186, 2006. (Pubitemid 43243857)
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 26
    • 55149095912 scopus 로고    scopus 로고
    • A novel scheme for protecting receiver's location privacy in wireless sensor networks
    • Oct
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3769-3779, Oct. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.10 , pp. 3769-3779
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 27
  • 28
    • 79551649009 scopus 로고    scopus 로고
    • Preserving source-location privacy in wireless sensor network using star routing
    • L. Lightfoot, Y. Li, and J. Ren, "Preserving source-location privacy in wireless sensor network using star routing," in Proc. GLOBECOM, 2010, pp. 1-5.
    • (2010) Proc. GLOBECOM , pp. 1-5
    • Lightfoot, L.1    Li, Y.2    Ren, J.3
  • 29
    • 79958205953 scopus 로고    scopus 로고
    • On the use of fake sources for source location privacy: Trade-offs between energy and privacy
    • A. Jhumka, M. Leeke, and S. Shrestha, "On the use of fake sources for source location privacy: Trade-offs between energy and privacy," Comput. J., vol. 54, no. 6, pp. 860-874, 2011.
    • (2011) Comput. J , vol.54 , Issue.6 , pp. 860-874
    • Jhumka, A.1    Leeke, M.2    Shrestha, S.3
  • 30
    • 80052215360 scopus 로고    scopus 로고
    • Maelstrom: Receiverlocation preserving in wireless sensor networks
    • Wireless Algorithms, Systems, and Applications Berlin/Heidelberg, Germany: Springer [Online]. Available
    • S. Chang, Y. Qi, H. Zhu, M. Dong, and K. Ota, "Maelstrom: Receiverlocation preserving in wireless sensor networks," in Wireless Algorithms, Systems, and Applications, LNCS 6843. Berlin/Heidelberg, Germany: Springer, 2011, pp. 190-201 [Online]. Available: http://dx.doi.org/10. 1007/978-3-642-23490-3?17
    • (2011) LNCS , vol.6843 , pp. 190-201
    • Chang, S.1    Qi, Y.2    Zhu, H.3    Dong, M.4    Ota, K.5
  • 32
    • 56749163645 scopus 로고    scopus 로고
    • Toward event source unobservability with minimum network traffic in sensor networks
    • Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Toward event source unobservability with minimum network traffic in sensor networks," in Proc. 1st ACM Conf. WiSec, 2008, pp. 77-88.
    • (2008) Proc. 1st ACM Conf. WiSec , pp. 77-88
    • Yang, Y.1    Shao, M.2    Zhu, S.3    Urgaonkar, B.4    Cao, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.