메뉴 건너뛰기




Volumn 1, Issue 5, 2014, Pages 430-445

Privacy-preserving channel access for internet of things

Author keywords

Channel access; distributed slot allocation; Internet of Things (IoT); privacy; trust domain.

Indexed keywords

AIR TRAFFIC CONTROL; DATA PRIVACY; EQUIPMENT TESTING; SCHEDULING;

EID: 84908465045     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2346513     Document Type: Article
Times cited : (28)

References (38)
  • 1
    • 84877273324 scopus 로고    scopus 로고
    • INFSO D.4 Networked Enterprise &RFID, INFSO G.2 Micro &NanoSystems in co-operation with the RFIDWorking Group of the European Technology Platform on Smart Systems Integration (EPoSS Online]. Available:
    • INFSO D.4 Networked Enterprise &RFID, INFSO G.2 Micro &NanoSystems in co-operation with the RFIDWorking Group of the European Technology Platform on Smart Systems Integration (EPoSS). Internet of Things in 2020: Roadmap for the Future [Online]. Available: http://www.caba.org/resources/Documents/IS-2008-93.pdf
    • Internet of Things in 2020: Roadmap for the Future
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010
    • (2010) Comput. Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 84861997111 scopus 로고    scopus 로고
    • Internet of Things: Vision, applications and research challenges
    • Sep
    • D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of Things: Vision, applications and research challenges," Ad Hoc Netw., vol. 10, no. 7, pp. 1497-1516, Sep. 2012
    • (2012) Ad Hoc Netw , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 4
    • 84928029704 scopus 로고    scopus 로고
    • Security and privacy challenges in the Internet of Things
    • Feb
    • C. P. Mayer, "Security and privacy challenges in the Internet of Things," Electron. Commun. EASST, vol. 17, Feb. 2009
    • (2009) Electron. Commun. EASST , vol.17
    • Mayer, C.P.1
  • 6
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2009, pp. 2213-2221
    • (2009) Proc. IEEE Conf. Comput. Commun. (INFOCOM , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 7
    • 84864253438 scopus 로고    scopus 로고
    • Statistical identification of encrypted Web browsing traffic
    • Q. Sun et al., "Statistical identification of encrypted Web browsing traffic," in Proc. IEEE Symp. Secur. Privacy, 2002, pp. 19-30
    • (2002) Proc. IEEE Symp. Secur. Privacy , pp. 19-30
    • Sun, Q.1
  • 10
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Sep
    • Y. Zhang,W. Liu,W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006
    • (2006) IEEE Trans. Wireless Commun , vol.5 , Issue.9 , pp. 2376-2385
    • Zhangw. Liuw. Lou, Y.1    Fang, Y.2
  • 13
    • 84908423349 scopus 로고    scopus 로고
    • Apigy Inc. Online]. Available: accessed on Feb
    • Apigy Inc. Lockitron-Keyless Entry Using Your Phone [Online]. Available: https://lockitron.com/, accessed on Feb. 28, 2014
    • (2014) Lockitron-Keyless Entry Using Your Phone , vol.28
  • 16
    • 45749132181 scopus 로고    scopus 로고
    • Z-mac: A hybrid mac for wireless sensor networks
    • Jun
    • I. Rhee, A. Warrier, M. Aia, J. Min, and M. L. Sichitiu, "Z-MAC: A hybrid MAC for wireless sensor networks," IEEE ACM Trans. Netw., vol. 16, no. 3, pp. 511-524, Jun. 2008
    • (2008) IEEE ACM Trans. Netw , vol.16 , Issue.3 , pp. 511-524
    • Rhee, I.1    Warrier, A.2    Aia, M.3    Min, J.4    Sichitiu, M.L.5
  • 17
    • 70449640450 scopus 로고    scopus 로고
    • TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
    • Dec
    • W.-Z. Song, R. Huang, B. Shirazi, and R. LaHusen, "TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks," Pervasive Mob. Comput., vol. 5, no. 6, pp. 750-765, Dec. 2009
    • (2009) Pervasive Mob. Comput , vol.5 , Issue.6 , pp. 750-765
    • Song, W.-Z.1    Huang, R.2    Shirazi, B.3    Lahusen, R.4
  • 18
    • 37549016465 scopus 로고    scopus 로고
    • Toward in-band self-organization in energyefficientMAC protocols for sensor networks
    • Feb
    • F. Yu, T.Wu, and S. Biswas, "Toward in-band self-organization in energyefficientMAC protocols for sensor networks,"IEEE Trans.Mob. Comput., vol. 7, no. 2, pp. 156-170, Feb. 2008
    • (2008) IEEE Trans.Mob. Comput , vol.7 , Issue.2 , pp. 156-170
    • Yu, F.1    Wu, T.2    Biswas, S.3
  • 20
    • 70349297218 scopus 로고    scopus 로고
    • DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks
    • Oct
    • I. Rhee, A. Warrier, J. Min, and L. Xu, "DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks," IEEE Trans. Mob. Comput., vol. 8, no. 10, pp. 1384-1396, Oct. 2009
    • (2009) IEEE Trans. Mob. Comput , vol.8 , Issue.10 , pp. 1384-1396
    • Rhee, I.1    Warrier, A.2    Min, J.3    Xu, L.4
  • 22
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Hiding, London, U.K
    • A. Back, U.Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proc. 4th Int. Workshop Inf. Hiding, London, U.K., 2001, pp. 245-257
    • (2001) Proc. 4th Int. Workshop Inf , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 23
    • 79952992733 scopus 로고    scopus 로고
    • Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
    • Mar
    • Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. S. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 834-843, Mar. 2011
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.3 , pp. 834-843
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Chen, J.4    Shen, X.S.5
  • 24
    • 80051908209 scopus 로고    scopus 로고
    • Defending against traffic analysis in wireless networks through traffic reshaping
    • F. Zhang, W. He, and X. Liu, "Defending against traffic analysis in wireless networks through traffic reshaping," in Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS), 2011, pp. 593-602
    • (2011) Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS , pp. 593-602
    • Zhang, F.1    He, W.2    Liu, X.3
  • 28
    • 34548302058 scopus 로고    scopus 로고
    • Energy efficient sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm
    • Y.Wu, S. Fahmy, and N. B. Shroff, "Energy efficient sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2007, pp. 1568-1576
    • (2007) Proc. IEEE Conf. Comput. Commun. (INFOCOM , pp. 1568-1576
    • Wu, Y.1    Fahmy, S.2    Shroff, N.B.3
  • 30
    • 84861593746 scopus 로고    scopus 로고
    • Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
    • Z.Wan, K. Xing, and Y. Liu, "Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2012, pp. 73-81
    • (2012) Proc. IEEE Conf. Comput. Commun. (INFOCOM , pp. 73-81
    • Wan, Z.1    Xing, K.2    Liu, Y.3
  • 36
    • 75449104170 scopus 로고    scopus 로고
    • Smart objects as building blocks for the Internet of Things
    • Jan
    • G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy, "Smart objects as building blocks for the Internet of Things," IEEE Internet Comput., vol. 14, no. 1, pp. 44-51, Jan. 2010
    • (2010) IEEE Internet Comput , vol.14 , Issue.1 , pp. 44-51
    • Kortuem, G.1    Kawsar, F.2    Fitton, D.3    Sundramoorthy, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.