Privacy Models in Wireless Sensor Networks: A Survey
暂无分享,去创建一个
Omid Mirzaei | José María de Fuentes | Lorena González-Manzano | Omid Mirzaei | J. M. D. Fuentes | L. González-Manzano
[1] Xianbin Wang,et al. Wireless Sensor Network Reliability and Security in Factory Automation: A Survey , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[2] Lin Yao,et al. Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[3] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[4] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[5] Yun Liu,et al. ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.
[6] A. Gurjar,et al. Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[7] Rabindra Bista,et al. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey , 2010, Sensors.
[8] Miad Faezipour,et al. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach , 2015, Sensors.
[9] Peilin Hong,et al. Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.
[10] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[11] Mohsen Guizani,et al. Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.
[12] Hoon Ko,et al. A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network , 2011, UCMA.
[13] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[14] Ke Xu,et al. An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.
[15] Jianjun Wu,et al. Privacy-Preserving Regression Modeling and Attack Analysis in Sensor Network , 2015, CloudCom-Asia.
[16] Yihua Zhang,et al. All proxy scheme for event source anonymity in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[17] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.
[18] Kyong-jin Kim,et al. Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[19] Qiaoyan Wen,et al. Protecting Sensor Location Privacy against Adversaries in Wireless Sensor Networks , 2013, 2013 International Conference on Computational and Information Sciences.
[20] Xu Ji,et al. Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.
[21] Basel Alomair,et al. Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[22] Alexis Olivereau,et al. Sensor and Data Privacy in Industrial Wireless Sensor Networks , 2011, 2011 Conference on Network and Information Systems Security.
[23] John A. Clark,et al. Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing , 2011, Networking Workshops.
[24] H. T. Mouftah,et al. Anti-traffic analysis attack for location privacy in WSNs , 2014, EURASIP J. Wirel. Commun. Netw..
[25] Lin Yao,et al. Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[26] Akshya Swain,et al. Wireless Sensor Network attacks: An overview and critical analysis , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).
[27] Prakhar Gupta,et al. Privacy preservation for WSN: A Survey , 2012 .
[28] Yang Yu,et al. Query privacy in wireless sensor networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[29] Rong-hua Hu,et al. Protecting Data Source Location Privacy in Wireless Sensor Networks against a Global Eavesdropper , 2014, Int. J. Distributed Sens. Networks.
[30] Sanggon Lee,et al. A Privacy Preserving Security Protocol-Based Application for Wireless Communication System , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[31] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[32] Habib Youssef,et al. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.
[33] Mauro Conti,et al. Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[34] Jian Ren,et al. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[35] Andrei Gurtov,et al. A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks , 2013 .
[36] Javier López,et al. Location Privacy in WSNs: Solutions, Challenges, and Future Trends , 2013, FOSAD.
[37] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[38] Shekhar Verma,et al. Efficient spatial privacy preserving scheme for sensor network , 2012 .
[39] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[40] Chi-Yin Chow,et al. Privacy Enhancing Technologies for Wireless Sensor Networks , 2014 .
[41] Chi-Yin Chow,et al. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[42] Mianxiong Dong,et al. Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.
[43] Liehuang Zhu,et al. Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks , 2013, 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks.
[44] Geng Yang,et al. Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[45] Roberto Di Pietro,et al. Events privacy in WSNs: A new model and its application , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[46] Shusen Yang,et al. A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems , 2015, Comput. Networks.
[47] Salil S. Kanhere,et al. Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract) , 2010 .
[48] Xiaojing Liao,et al. Privacy-preserving and secure top-k query in two-tier wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[49] Sajal K. Das,et al. Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks , 2012, ICDCN.
[50] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[51] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[52] Daqiang Zhang,et al. An Efficient Privacy-Preserving Compressive Data Gathering Scheme in WSNs , 2015, ICA3PP.
[53] Levente Buttyán,et al. Perfectly anonymous data aggregation in wireless sensor networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).