메뉴 건너뛰기




Volumn 16, Issue PA, 2015, Pages 36-50

On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks

Author keywords

Local eavesdropper; Location privacy; Wireless sensor networks

Indexed keywords

ANIMALS; CONSERVATION; DATA PRIVACY; FORESTRY; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84921068731     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2014.01.006     Document Type: Article
Times cited : (80)

References (31)
  • 1
    • 84861198400 scopus 로고    scopus 로고
    • Energy-efficient mobile target detection in wireless sensor networks with random node deployment and partial coverage
    • P. Medagliani, J. Leguay, G. Ferrari, V. Gay, M. Lopez-Ramos, Energy-efficient mobile target detection in wireless sensor networks with random node deployment and partial coverage, Pervasive Mob. Comput. 8 (3) (2012) 429-447.
    • (2012) Pervasive Mob. Comput. , vol.8 , Issue.3 , pp. 429-447
    • Medagliani, P.1    Leguay, J.2    Ferrari, G.3    Gay, V.4    Lopez-Ramos, M.5
  • 4
    • 77953297684 scopus 로고    scopus 로고
    • Delay tolerant event collection in sensor networks with mobile sink
    • X. Xu, J. Luo, Q. Zhang, Delay tolerant event collection in sensor networks with mobile sink, in: Proc. of IEEE INFOCOM, 2010.
    • Proc. of IEEE INFOCOM, 2010
    • Xu, X.1    Luo, J.2    Zhang, Q.3
  • 5
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wirel. Netw. 8 (5) (2002) 521-534.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4
  • 12
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • Y. Jian, S. Chen, Z. Zhang, L. Zhang, Protecting receiver-location privacy in wireless sensor networks, in: Proc. of IEEE INFOCOM, 2007, pp. 1955-1963.
    • Proc. of IEEE INFOCOM, 2007 , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 14
    • 51249113844 scopus 로고    scopus 로고
    • A source-location privacy protocol in WSN based on locational angle
    • W. Wang, L. Chen, J. Wang, A source-location privacy protocol in WSN based on locational angle, in: Proc. of IEEE ICC, 2008, pp. 1630-1634.
    • Proc. of IEEE ICC, 2008 , pp. 1630-1634
    • Wang, W.1    Chen, L.2    Wang, J.3
  • 16
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • H. Wang, B. Sheng, Q. Li, Privacy-aware routing in sensor networks, Comput. Netw. 53 (9) (2009) 1512-1529.
    • (2009) Comput. Netw. , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 17
    • 70449602456 scopus 로고    scopus 로고
    • Preserving source-location privacy in wireless sensor networks
    • Y. Li, J. Ren, Preserving source-location privacy in wireless sensor networks, in: Proc. of IEEE SECON, 2009.
    • Proc. of IEEE SECON, 2009
    • Li, Y.1    Ren, J.2
  • 18
    • 77953302309 scopus 로고    scopus 로고
    • Source-location privacy through dynamic routing in wireless sensor networks
    • Y. Li, J. Ren, Source-location privacy through dynamic routing in wireless sensor networks, in: Proc. of IEEE INFOCOM, 2010.
    • Proc. of IEEE INFOCOM, 2010
    • Li, Y.1    Ren, J.2
  • 22
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao, Y. Yang, S. Zhu, G. Cao, Towards statistically strong source anonymity for sensor networks, in: Proc. of IEEE INFOCOM, 2008, pp. 1298-1306.
    • Proc. of IEEE INFOCOM, 2008 , pp. 1298-1306
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 24
    • 84861017329 scopus 로고    scopus 로고
    • Enhancing sink-location privacy in wireless sensor networks through k-anonymity
    • G. Chai, M. Xu, W. Xu, Z. Lin, Enhancing sink-location privacy in wireless sensor networks through k-anonymity, Int. J. Distrib. Sens. Netw. (2012).
    • (2012) Int. J. Distrib. Sens. Netw.
    • Chai, G.1    Xu, M.2    Xu, W.3    Lin, Z.4
  • 28
    • 84863471916 scopus 로고    scopus 로고
    • Shortest path computation with no information leakage
    • K. Mouratidis, M.L. Yiu, Shortest path computation with no information leakage, Proc. VLDB Endow. 5 (8) (2012) 692-703.
    • (2012) Proc. VLDB Endow. , vol.5 , Issue.8 , pp. 692-703
    • Mouratidis, K.1    Yiu, M.L.2
  • 29
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Special Issue on Sensor Network Applications and Protocols
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier Ad Hoc Netw. J 1 (2-3) (2003) 293-315. Special Issue on Sensor Network Applications and Protocols.
    • (2003) Elsevier Ad Hoc Netw. J , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.