메뉴 건너뛰기




Volumn 1, Issue 5, 2014, Pages 461-471

An anti-tracking source-location privacy protection protocol in WSNs based on path extension

Author keywords

Environment monitoring; source location privacy; traffic analysis; wireless sensor networks (WSNs).

Indexed keywords

BASE STATIONS; DATA PRIVACY;

EID: 84908418874     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2346813     Document Type: Article
Times cited : (57)

References (23)
  • 2
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • (SenSys04), New York, NY, USA Nov
    • C. Karlof, N. Sastry, and D.Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst. (SenSys04), New York, NY, USA, Nov. 2004, pp. 162-175
    • (2004) Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 4
    • 33847297141 scopus 로고    scopus 로고
    • Countermeasures against traffic analysis attacks in wireless sensor networks
    • SecureComm05), Athens, Greece
    • J. Deng, R. Han, and S.Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," in Proc. 1st IEEE Conf. Security Privacy Emerg. Areas Commun. Netw. (SecureComm05), Athens, Greece, 2005, pp. 113-126
    • (2005) Proc. 1st IEEE Conf. Security Privacy Emerg. Areas Commun. Netw , pp. 113-126
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 5
    • 84897001610 scopus 로고    scopus 로고
    • [Online]. Available
    • - (2005). The Free Haven project [Online]. Available: http://freehaven. net/anonbib/date.html
    • (2005) The Free Haven Project
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return address, and digital pseudonyms
    • Feb
    • D. Chaum, "Untraceable electronic mail, return address, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Anchorage, AK, USA, May
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," in Proc. 1st IEEE Int. Workshop Sensor Netw. Protocols Appl., Anchorage, AK, USA, May 2003, pp. 113-127
    • (2003) Proc. 1st IEEE Int. Workshop Sensor Netw. Protocols Appl , pp. 113-127
    • Karlof, C.1    Wagner, D.2
  • 8
    • 84871814015 scopus 로고    scopus 로고
    • Toward a statistical framework for source anonymity in sensor networks
    • Feb
    • B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Toward a statistical framework for source anonymity in sensor networks," IEEE Trans. Mobile Comput., vol. 12, no. 2, pp. 248-260, Feb. 2013
    • (2013) IEEE Trans. Mobile Comput , vol.12 , Issue.2 , pp. 248-260
    • Alomair, B.1    Clark, A.2    Cuellar, J.3    Poovendran, R.4
  • 10
    • 77953302309 scopus 로고    scopus 로고
    • Source-location privacy through dynamic routing in wireless sensor networks
    • San Diego, CA, USA, Mar
    • Y. Li and J. Ren, "Source-location privacy through dynamic routing in wireless sensor networks," in Proc. 29th IEEE Int. Conf. Comput. Commun. (INFOCOM10), San Diego, CA, USA, Mar. 2010, pp. 1-9
    • (2010) Proc. 29th IEEE Int. Conf. Comput. Commun. (INFOCOM10 , pp. 1-9
    • Li, Y.1    Ren, J.2
  • 11
    • 84880892668 scopus 로고    scopus 로고
    • Cluster based anonymization for source location privacy in wireless sensor network
    • Gwalior, India, Apr
    • A. Gurjar and A. R. B. Patil, "Cluster based anonymization for source location privacy in wireless sensor network," in Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT13), Gwalior, India, Apr. 2013, pp. 248-251
    • (2013) Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT13 , pp. 248-251
    • Gurjar, A.1    Patil, A.R.B.2
  • 14
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • Beijing, China, Oct
    • K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. IEEE Int. Conf. Netw. Protocols (ICNP07), Beijing, China, Oct. 2007, pp. 314-323
    • (2007) Proc. IEEE Int. Conf. Netw. Protocols (ICNP07 , pp. 314-323
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 16
    • 56749163645 scopus 로고    scopus 로고
    • Towards event source unobservability with minimum network traffic in sensor networks
    • New York, NY, USA, Mar
    • Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proc. 1st ACM Conf. Wireless Netw. Security (WiSec08), New York, NY, USA, Mar. 2008, pp. 77-88
    • (2008) Proc. 1st ACM Conf. Wireless Netw. Security (WiSec08 , pp. 77-88
    • Yang, Y.1    Shao, M.2    Zhu, S.3    Urgaonkar, B.4    Cao, G.5
  • 17
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • Jun
    • H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Comput. Netw., vol. 53, no. 9, pp. 1512-1529, Jun. 2009
    • (2009) Comput. Netw , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 18
    • 79960880538 scopus 로고    scopus 로고
    • Maintaining source privacy under eavesdropping and node compromise attacks
    • Shanghai, China, Apr
    • K. Pongaliur and L. Xiao, "Maintaining source privacy under eavesdropping and node compromise attacks," in Proc. 30th IEEE Int. Conf. Comput. Commun. (INFOCOM11), Shanghai, China, Apr. 2011, pp. 1656-1664
    • (2011) Proc. 30th IEEE Int. Conf. Comput. Commun. (INFOCOM11 , pp. 1656-1664
    • Pongaliur, K.1    Xiao, L.2
  • 19
    • 33845942290 scopus 로고    scopus 로고
    • Entrapping adversaries for source protection in sensor networks
    • (WoWMoM06), Buffalo-Niagara Falls, NY, USA, Jun
    • Y. Ouyang, Z. Le, G. Chen, J. Ford, and F Makedon, "Entrapping adversaries for source protection in sensor networks," in IEEE Int. Symp. World Wireless Mobile Multimedia Netw. (WoWMoM06), Buffalo-Niagara Falls, NY, USA, Jun. 2006, pp. 25-34
    • (2006) IEEE Int. Symp. World Wireless Mobile Multimedia Netw , pp. 25-34
    • Ouyang, Y.1    Le, Z.2    Chen, G.3    Ford, J.4    Makedon, F.5
  • 20
    • 84555189295 scopus 로고    scopus 로고
    • Protecting location privacy in sensor networks against a global eavesdropper
    • Feb
    • K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Comput., vol. 11, no. 2, pp. 320-336, Feb. 2011
    • (2011) IEEE Trans. Mobile Comput , vol.11 , Issue.2 , pp. 320-336
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 21
    • 84883074480 scopus 로고    scopus 로고
    • Passages: Preserving anonymity of sources and sinks against global eavesdroppers
    • Turin, Italy, Apr
    • H. Park, S. Song, B. Y. Choi, and C. T. Huang, "PASSAGES: Preserving anonymity of sources and sinks against global eavesdroppers," in Proc. 32th IEEE Int. Conf. Comput. Commun. (INFOCOM13), Turin, Italy, Apr. 2013, pp. 210-214
    • (2013) Proc. 32th IEEE Int. Conf. Comput. Commun. (INFOCOM13 , pp. 210-214
    • Park, H.1    Song, S.2    Choi, B.Y.3    Huang, C.T.4
  • 22
    • 84874443482 scopus 로고    scopus 로고
    • Sensor source location privacy based on random perturbations
    • Appl. Worksharing (CollaborateCom12), Pittsburgh, PA, USA, Oct
    • U. Srimongkolpitak and Y. Yang, "Sensor source location privacy based on random perturbations," in Proc. 8th Int. Conf. Collab. Comput. Netw., Appl. Worksharing (CollaborateCom12), Pittsburgh, PA, USA, Oct. 2012, pp. 500-507
    • (2012) Proc. 8th Int. Conf. Collab. Comput. Netw , pp. 500-507
    • Srimongkolpitak, U.1    Yang, Y.2
  • 23
    • 51249113844 scopus 로고    scopus 로고
    • A source-location privacy protocol in WSN based on locational angle
    • Beijing, China, May
    • W. Wang, L. Chen, and J. Wang, "A source-location privacy protocol in WSN based on locational angle," in Proc. IEEE Int. Conf. Commun. (ICC08), Beijing, China, May 2008, pp. 1630-1634
    • (2008) Proc. IEEE Int. Conf. Commun. (ICC08 , pp. 1630-1634
    • Wang, W.1    Chen, L.2    Wang, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.