Privacy-Preserving Channel Access for Internet of Things
暂无分享,去创建一个
[1] Nitin H. Vaidya,et al. A dynamic mix method for wireless ad hoc networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[2] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[3] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[4] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[5] Shijue Zheng,et al. A Scheduling Algorithm for TDMA-Based MAC Protocol in Wireless Sensor Networks , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[6] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Xiang-Yang Li,et al. Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[8] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.
[9] J. Degesys,et al. DESYNC: Self-Organizing Desynchronization and TDMA on Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[10] Nitin H. Vaidya,et al. A mix route algorithm for mix-net in wireless mobile ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[11] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[12] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[13] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[14] Ramesh Govindan,et al. Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.
[15] Injong Rhee,et al. DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks , 2009, IEEE Trans. Mob. Comput..
[16] Fan Zhang,et al. Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping , 2011, 2011 31st International Conference on Distributed Computing Systems.
[17] Bruce Hajek,et al. Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.
[18] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[19] Tao Wu,et al. Toward In-Band Self-Organization in Energy-Efficient MAC Protocols for Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[20] Christoph P. Mayer. Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .
[21] Renjie Huang,et al. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks , 2009, Pervasive Mob. Comput..
[22] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[23] Ness B. Shroff,et al. Energy Efficient Sleep/Wake Scheduling for Multi-Hop Sensor Networks: Non-Convexity and Approximation Algorithm , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[24] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[25] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[26] Subir Biswas,et al. Distributed TDMA for privacy sensitive anonymous networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[27] Jiming Chen,et al. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks , 2011, IEEE Transactions on Wireless Communications.
[28] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[29] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[30] Injong Rhee,et al. Z-MAC: a hybrid MAC for wireless sensor networks , 2005, SenSys '05.
[31] Francesca Cuomo,et al. Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks , 2006, SenSys '06.
[32] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[33] Srinivasan Seshan,et al. Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.
[34] Zhihui Chen,et al. Self organization and energy efficient TDMA MAC protocol by wake up for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[35] Yunhao Liu,et al. Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.