메뉴 건너뛰기




Volumn 75, Issue , 2017, Pages 46-57

Evolving privacy: From sensors to the Internet of Things

Author keywords

Challenges; Internet of Things; Privacy; WSN

Indexed keywords

DATA PRIVACY; WIRELESS SENSOR NETWORKS;

EID: 85019907089     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.04.045     Document Type: Article
Times cited : (132)

References (68)
  • 1
    • 84964636134 scopus 로고    scopus 로고
    • The Internet of things will change our world
    • Keynote. URL
    • Links, C., The Internet of things will change our world. ERCIM News(101), 2015, 3 Keynote. URL https://ercim-news.ercim.eu/images/stories/EN101/EN101-web.pdf.
    • (2015) ERCIM News , Issue.101 , pp. 3
    • Links, C.1
  • 2
    • 85019926380 scopus 로고    scopus 로고
    • How The Internet Of Things Will Change (And Improve) Our Everyday Lives
    • (Accessed: 03/2017) (Oct)
    • H. Green, How The Internet Of Things Will Change (And Improve) Our Everyday Lives, https://www.forbes.com/sites/ibm/2016/10/04/how-the-internet-of-things-will-change-and-improve-our-everyday-lives/  (Accessed: 03/2017) (Oct 2016).
    • (2016)
    • Green, H.1
  • 3
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57:10 (2013), 2266–2279, 10.1016/j.comnet.2012.12.018.
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 4
    • 85019923460 scopus 로고    scopus 로고
    • ards Association, IoT Architecture - Internet of Things (IoT) Architecture, (Accessed: 02/2017)
    • IEEE Standards Association, IoT Architecture - Internet of Things (IoT) Architecture, https://standards.ieee.org/develop/wg/IoT_Architecture.html  (Accessed: 02/2017) (2016).
    • (2016)
    • St, I.E.E.E.1
  • 5
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M., Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29:7 (2013), 1645–1660, 10.1016/j.future.2013.01.010.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 6
    • 85019857627 scopus 로고    scopus 로고
    • 5G Security: Forward Thinking, (Accessed: 02/2017)
    • Huawei Technologies Co., Ltd., 5G Security: Forward Thinking, http://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf  (Accessed: 02/2017) (2015).
    • (2015)
    • Huawei Technologies Co., Ltd.,1
  • 7
    • 85019830912 scopus 로고    scopus 로고
    • 5G Security - Scenarios and Solutions, (Accessed: 02/2017)
    • Ericsson AB, 5G Security - Scenarios and Solutions, https://www.ericsson.com/res/docs/whitepapers/wp-5g-security.pdf  (Accessed: 02/2017) (2015).
    • (2015)
    • Ericsson, A.B.1
  • 8
    • 85019844581 scopus 로고    scopus 로고
    • NGMN 5G White Paper, (Accessed: 02/2017)
    • Next Generation Mobile Networks, NGMN 5G White Paper, https://www.ngmn.org/uploads/media/NGMN_5G_White_Paper_V1_0.pdf  (Accessed: 02/2017) (2015).
    • (2015)
    • Next Generation Mobile Networks1
  • 9
    • 84957841635 scopus 로고    scopus 로고
    • The internet of things (iot) and its impact on individual privacy: An australian perspective
    • URL
    • Caron, X., Bosua, R., Maynard, S.B., Ahmad, A., The internet of things (iot) and its impact on individual privacy: An australian perspective. Comput. Law Secur. Rev. 32:1 (2016), 4–15, 10.1016/j.clsr.2015.12.001 URL http://www.sciencedirect.com/science/article/pii/S0267364915001661.
    • (2016) Comput. Law Secur. Rev. , vol.32 , Issue.1 , pp. 4-15
    • Caron, X.1    Bosua, R.2    Maynard, S.B.3    Ahmad, A.4
  • 10
    • 84911900606 scopus 로고    scopus 로고
    • Privacy in the internet of things: threats andchallenges
    • Ziegeldorf, J.H., Morchon, O.G., Wehrle, K., Privacy in the internet of things: threats andchallenges. Secur. Commun. Netw. 7:12 (2014), 2728–2742, 10.1002/sec.795.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.12 , pp. 2728-2742
    • Ziegeldorf, J.H.1    Morchon, O.G.2    Wehrle, K.3
  • 12
    • 84857300683 scopus 로고    scopus 로고
    • Analysis of location privacy solutions in wireless sensor networks
    • Rios, R., Lopez, J., Analysis of location privacy solutions in wireless sensor networks. IET Commun. 5 (2011), 2518–2532, 10.1049/iet-com.2010.0825.
    • (2011) IET Commun. , vol.5 , pp. 2518-2532
    • Rios, R.1    Lopez, J.2
  • 13
    • 84876786771 scopus 로고    scopus 로고
    • (Un)suitability of anonymous communication systems to WSN
    • Rios, R., Lopez, J., (Un)suitability of anonymous communication systems to WSN. IEEE Syst. J. 7:2 (2013), 298–310, 10.1109/JSYST.2012.2221956.
    • (2013) IEEE Syst. J. , vol.7 , Issue.2 , pp. 298-310
    • Rios, R.1    Lopez, J.2
  • 14
    • 84870459478 scopus 로고    scopus 로고
    • Information privacy?!
    • Camenisch, J., Information privacy?!. Comput. Netw. 56 (2012), 3834–3848, 10.1016/j.comnet.2012.10.012.
    • (2012) Comput. Netw. , vol.56 , pp. 3834-3848
    • Camenisch, J.1
  • 15
    • 85019872617 scopus 로고    scopus 로고
    • AVG can sell your browsing and search history to advertisers, (Accessed: 02/2017) (Sept).
    • J. Temperton, AVG can sell your browsing and search history to advertisers, http://www.wired.co.uk/news/archive/2015-09/17/avg-privacy-policy-browser-search-data  (Accessed: 02/2017) (Sept 2015).
    • (2015)
    • Temperton, J.1
  • 16
    • 85019959518 scopus 로고    scopus 로고
    • Popular ID app could sell YOUR personal data to third-parties, without you even knowing it, (Accessed: 02/2017) (Aug)
    • J. Parsons, Popular ID app could sell YOUR personal data to third-parties, without you even knowing it, http://www.mirror.co.uk/news/technology-science/technology/popular-id-app-could-sell-6205624  (Accessed: 02/2017) (Aug 2015).
    • (2015)
    • Parsons, J.1
  • 17
    • 84944317103 scopus 로고    scopus 로고
    • Design and technical evaluation of an implantable passive sensor for minimally invasive wireless intracranial pressure monitoring
    • Springer
    • Behfar, M., Moradi, E., Bjrninen, T., Sydnheimo, L., Ukkonen, L., Design and technical evaluation of an implantable passive sensor for minimally invasive wireless intracranial pressure monitoring. World Congress on Medical Physics and Biomedical Engineering, Vol. 51, 2015, Springer, 1301–1304, 10.1007/978-3-319-19387-8_316.
    • (2015) World Congress on Medical Physics and Biomedical Engineering, Vol. 51 , pp. 1301-1304
    • Behfar, M.1    Moradi, E.2    Bjrninen, T.3    Sydnheimo, L.4    Ukkonen, L.5
  • 18
    • 85019833897 scopus 로고
    • Privacy and Freedom, first ed., New York Atheneum
    • A.F. Westin, Privacy and Freedom, first ed., New York Atheneum, 1967.
    • (1967)
    • Westin, A.F.1
  • 19
    • 84933053491 scopus 로고    scopus 로고
    • What was samsung thinking?
    • Landau, S., What was samsung thinking?. IEEE Secur. Privacy 13:3 (2015), 3–4, 10.1109/MSP.2015.63.
    • (2015) IEEE Secur. Privacy , vol.13 , Issue.3 , pp. 3-4
    • Landau, S.1
  • 20
    • 85019917886 scopus 로고    scopus 로고
    • 15 worst internet privacy scandals of all time, (Accessed: 02/2017)
    • C.D. Marsan, 15 worst internet privacy scandals of all time, http://www.networkworld.com/article/2185187/security/15-worst-internet-privacy-scandals-of-all-time.html  (Accessed: 02/2017) (2012).
    • (2012)
    • Marsan, C.D.1
  • 21
    • 67651030465 scopus 로고    scopus 로고
    • Efficient and provably secure aggregation of encrypted data in wireless sensor networks
    • Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G., Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5:3 (2009), 20:1–20:36, 10.1145/1525856.1525858.
    • (2009) ACM Trans. Sensor Netw. , vol.5 , Issue.3 , pp. 201-20:36
    • Castelluccia, C.1    Chan, A.C.-F.2    Mykletun, E.3    Tsudik, G.4
  • 22
    • 84921731757 scopus 로고    scopus 로고
    • Confidentiality and integrity for data aggregation in wsn using homomorphic encryption
    • Othman, S., Bahattab, A., Trad, A., Youssef, H., Confidentiality and integrity for data aggregation in wsn using homomorphic encryption. Wirel. Pers. Commun. 80:2 (2015), 867–889, 10.1007/s11277-014-2061-z.
    • (2015) Wirel. Pers. Commun. , vol.80 , Issue.2 , pp. 867-889
    • Othman, S.1    Bahattab, A.2    Trad, A.3    Youssef, H.4
  • 23
    • 84862787823 scopus 로고    scopus 로고
    • RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
    • Chen, C.-M., Lin, Y.-H., Lin, Y.-C., Sun, H.-M., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23:4 (2012), 727–734, 10.1109/TPDS.2011.219.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.4 , pp. 727-734
    • Chen, C.-M.1    Lin, Y.-H.2    Lin, Y.-C.3    Sun, H.-M.4
  • 24
    • 84878316913 scopus 로고    scopus 로고
    • CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks
    • Lin, Y.-H., Chang, S.-Y., Sun, H.-M., CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 25:7 (2013), 1471–1483, 10.1109/TKDE.2012.94.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , Issue.7 , pp. 1471-1483
    • Lin, Y.-H.1    Chang, S.-Y.2    Sun, H.-M.3
  • 26
    • 84877970558 scopus 로고    scopus 로고
    • Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks
    • 427275
    • Yang, G., Li, S., Xu, X., Dai, H., Yang, Z., Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks. Int. J. Distrib. Sens. Netw., 2013(427275), 2013, 12, 10.1155/2013/427275.
    • (2013) Int. J. Distrib. Sens. Netw. , vol.2013 , pp. 12
    • Yang, G.1    Li, S.2    Xu, X.3    Dai, H.4    Yang, Z.5
  • 28
    • 79960854358 scopus 로고    scopus 로고
    • KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks
    • IEEE
    • Groat, M.M., Hey, W., Forrest, S., KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks. IEEE INFOCOM 2011, 2011, IEEE, 2024–2032.
    • (2011) IEEE INFOCOM 2011 , pp. 2024-2032
    • Groat, M.M.1    Hey, W.2    Forrest, S.3
  • 29
    • 84923029609 scopus 로고    scopus 로고
    • PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks
    • Ozdemir, S., Peng, M., Xiao, Y., PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks. Wirel. Commun. Mob. Comput. 15:4 (2015), 615–628, 10.1002/wcm.2369.
    • (2015) Wirel. Commun. Mob. Comput. , vol.15 , Issue.4 , pp. 615-628
    • Ozdemir, S.1    Peng, M.2    Xiao, Y.3
  • 30
    • 84891063786 scopus 로고    scopus 로고
    • Privacy-enhanced data aggregation scheme against internal attackers in smart grid
    • Fan, C.-I., Huang, S.-Y., Lai, Y.-L., Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inf. 10:1 (2014), 666–675, 10.1109/TII.2013.2277938.
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.1 , pp. 666-675
    • Fan, C.-I.1    Huang, S.-Y.2    Lai, Y.-L.3
  • 31
    • 78751642439 scopus 로고    scopus 로고
    • Location privacy and resilience in wireless sensor networks querying
    • Di Pietro, R., Viejo, A., Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34:3 (2011), 515–523, 10.1016/j.comcom.2010.05.014.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 515-523
    • Di Pietro, R.1    Viejo, A.2
  • 36
    • 77950365227 scopus 로고    scopus 로고
    • Private information retrieval
    • Yekhanin, S., Private information retrieval. Commun. ACM 53:4 (2010), 68–73, 10.1145/1721654.1721674.
    • (2010) Commun. ACM , vol.53 , Issue.4 , pp. 68-73
    • Yekhanin, S.1
  • 39
    • 73349103422 scopus 로고    scopus 로고
    • Temporal privacy in wireless sensor networks: Theory and practice
    • Kamat, P., Xu, W., Trappe, W., Zhang, Y., Temporal privacy in wireless sensor networks: Theory and practice. ACM Trans. Sensor Netw. 5:4 (2009), 28:1–28:24, 10.1145/1614379.1614380.
    • (2009) ACM Trans. Sensor Netw. , vol.5 , Issue.4 , pp. 281-28:24
    • Kamat, P.1    Xu, W.2    Trappe, W.3    Zhang, Y.4
  • 40
    • 84936941264 scopus 로고    scopus 로고
    • A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems
    • Yang, X., Ren, X., Yang, S., McCann, J., A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems. Comput. Netw. 88 (2015), 72–88, 10.1016/j.comnet.2015.06.007.
    • (2015) Comput. Netw. , vol.88 , pp. 72-88
    • Yang, X.1    Ren, X.2    Yang, S.3    McCann, J.4
  • 41
    • 84900637145 scopus 로고    scopus 로고
    • A survey of intrusion detection in wireless network applications
    • Mitchell, R., Chen, I.-R., A survey of intrusion detection in wireless network applications. Comput. Commun. 42:0 (2014), 1–23, 10.1016/j.comcom.2014.01.012.
    • (2014) Comput. Commun. , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.-R.2
  • 42
    • 13244293318 scopus 로고    scopus 로고
    • IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements
    • Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)
    • The Institute of Electrical and Electronics Engineers (IEEE), IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), http://standards.ieee.org/getieee802/download/802.15.4-2006.pdf (2006).
    • (2006)
    • The Institute of Electrical and Electronics Engineers (IEEE)1
  • 43
    • 52249120873 scopus 로고    scopus 로고
    • Efficient anonymity schemes for clustered wireless sensor networks
    • Misra, S., Xue, G., Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw. 1:1 (2006), 50–63, 10.1504/IJSNET.2006.010834.
    • (2006) Int. J. Sensor Netw. , vol.1 , Issue.1 , pp. 50-63
    • Misra, S.1    Xue, G.2
  • 44
    • 55649095270 scopus 로고    scopus 로고
    • Location privacy and anonymity preserving routing for wireless sensor networks
    • Nezhad, A.A., Miri, A., Makrakis, D., Location privacy and anonymity preserving routing for wireless sensor networks. Comput. Netw. 52:18 (2008), 3433–3452, 10.1016/j.comnet.2008.09.005.
    • (2008) Comput. Netw. , vol.52 , Issue.18 , pp. 3433-3452
    • Nezhad, A.A.1    Miri, A.2    Makrakis, D.3
  • 46
    • 79953894894 scopus 로고    scopus 로고
    • An anonymous path routing (APR) protocol for wireless sensor networks
    • URL
    • Jiang, J.-R., Sheu, J.-P., Tu, C., Wu, J.-W., An anonymous path routing (APR) protocol for wireless sensor networks. J. Inf. Sci. Eng. 27:2 (2011), 657–680 URL http://www.iis.sinica.edu.tw/page/jise/2011/201103_16.html.
    • (2011) J. Inf. Sci. Eng. , vol.27 , Issue.2 , pp. 657-680
    • Jiang, J.-R.1    Sheu, J.-P.2    Tu, C.3    Wu, J.-W.4
  • 47
    • 84866061327 scopus 로고    scopus 로고
    • An efficient anonymous communication protocol for wireless sensor networks
    • Chen, J., Du, X., Fang, B., An efficient anonymous communication protocol for wireless sensor networks. Wirel. Commun. Mob. Comput. 12:14 (2012), 1302–1312, 10.1002/wcm.1205.
    • (2012) Wirel. Commun. Mob. Comput. , vol.12 , Issue.14 , pp. 1302-1312
    • Chen, J.1    Du, X.2    Fang, B.3
  • 48
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A., RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 24:2 (2006), 381–394, 10.1109/JSAC.2005.861395.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 50
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • Wang, H., Sheng, B., Li, Q., Privacy-aware routing in sensor networks. Comput. Netw. 53:9 (2009), 1512–1529, 10.1016/j.comnet.2009.02.002.
    • (2009) Comput. Netw. , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 51
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • Deng, J., Han, R., Mishra, S., Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mob. Comput. 2:2 (2006), 159–186, 10.1016/j.pmcj.2005.12.003.
    • (2006) Pervasive Mob. Comput. , vol.2 , Issue.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 52
    • 55149095912 scopus 로고    scopus 로고
    • A novel scheme for protecting receiver's location privacy in wireless sensor networks
    • Jian, Y., Chen, S., Zhang, Z., Zhang, L., A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Trans. Wireless Commun. 7:10 (2008), 3769–3779, 10.1109/T-WC.2008.070182.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.10 , pp. 3769-3779
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 53
    • 79958205953 scopus 로고    scopus 로고
    • On the use of fake sources for source location privacy: Trade-offs between energy and privacy
    • Jhumka, A., Leeke, M., Shrestha, S., On the use of fake sources for source location privacy: Trade-offs between energy and privacy. Comput. J. 54:6 (2011), 860–874, 10.1093/comjnl/bxr010.
    • (2011) Comput. J. , vol.54 , Issue.6 , pp. 860-874
    • Jhumka, A.1    Leeke, M.2    Shrestha, S.3
  • 54
    • 84883449680 scopus 로고    scopus 로고
    • Protecting the sink location privacy in wireless sensor networks
    • Yao, L., Kang, L., Shang, P., Wu, G., Protecting the sink location privacy in wireless sensor networks. Pers. Ubiquitous Comput., 2012, 1–11, 10.1007/s00779-012-0539-9.
    • (2012) Pers. Ubiquitous Comput. , pp. 1-11
    • Yao, L.1    Kang, L.2    Shang, P.3    Wu, G.4
  • 56
    • 80053515818 scopus 로고    scopus 로고
    • Exploiting context-awareness to enhance source-location privacy in wireless sensor networks
    • Rios, R., Lopez, J., Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput. J. 54:10 (2011), 1603–1615, 10.1093/comjnl/BXR055.
    • (2011) Comput. J. , vol.54 , Issue.10 , pp. 1603-1615
    • Rios, R.1    Lopez, J.2
  • 59
    • 84871814015 scopus 로고    scopus 로고
    • Towards a statistical framework for source anonymity in sensor networks
    • Alomair, B., Clark, A., Cuellar, J., Poovendran, R., Towards a statistical framework for source anonymity in sensor networks. IEEE Trans. Mob. Comput. 12:2 (2012), 248–260, 10.1109/TMC.2011.267.
    • (2012) IEEE Trans. Mob. Comput. , vol.12 , Issue.2 , pp. 248-260
    • Alomair, B.1    Clark, A.2    Cuellar, J.3    Poovendran, R.4
  • 61
    • 84555189295 scopus 로고    scopus 로고
    • Protecting location privacy in sensor networks against a global eavesdropper
    • Mehta, K., Liu, D., Wright, M., Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mob. Comput. 11:2 (2012), 320–336, 10.1109/TMC.2011.32.
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , Issue.2 , pp. 320-336
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 62
    • 67649494461 scopus 로고    scopus 로고
    • pDCS: Security and privacy support for data-centric sensor networks
    • Shao, M., Zhu, S., Zhang, W., Cao, G., Yang, Y., pDCS: Security and privacy support for data-centric sensor networks. IEEE Trans. Mob. Comput. 8:8 (2009), 1023–1038, 10.1109/TMC.2008.168.
    • (2009) IEEE Trans. Mob. Comput. , vol.8 , Issue.8 , pp. 1023-1038
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4    Yang, Y.5
  • 63
    • 84938212949 scopus 로고    scopus 로고
    • Probabilistic receiver-location privacy protection in wireless sensor networks
    • Rios, R., Cuellar, J., Lopez, J., Probabilistic receiver-location privacy protection in wireless sensor networks. Inform. Sci. 321 (2015), 205–223, 10.1016/j.ins.2015.01.016.
    • (2015) Inform. Sci. , vol.321 , pp. 205-223
    • Rios, R.1    Cuellar, J.2    Lopez, J.3
  • 65
    • 84883331959 scopus 로고    scopus 로고
    • Cognitive radio wireless sensor networks: applications, challenges and research trends
    • Joshi, G.P., Nam, S.Y., Kim, S.W., Cognitive radio wireless sensor networks: applications, challenges and research trends. Sensors 13:9 (2013), 11196–11228, 10.3390/s130911196.
    • (2013) Sensors , vol.13 , Issue.9 , pp. 11196-11228
    • Joshi, G.P.1    Nam, S.Y.2    Kim, S.W.3
  • 66
    • 51249098943 scopus 로고    scopus 로고
    • A new replay attack against anonymous communication networks
    • ICC’08, pp.
    • R. Pries, W. Yu, X. Fu, W. Zhao, A new replay attack against anonymous communication networks, in: IEEE International Conference on Communications, ICC’08, 2008, pp. 1578–1582. http://dx.doi.org/10.1109/ICC.2008.305.
    • (2008) IEEE International Conference on Communications , pp. 1578-1582
    • Pries, R.1    Yu, W.2    Fu, X.3    Zhao, W.4
  • 68
    • 85019869360 scopus 로고    scopus 로고
    • Wearables for your brain, (Accessed 02/2017)
    • Emotiv, Inc., Wearables for your brain, https://www.emotiv.com/  (Accessed 02/2017) (2014).
    • (2014)
    • Emotiv, Inc.,1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.