Privacy-preserving channel access using blindfolded packet transmissions
暂无分享,去创建一个
[1] Srinivasan Seshan,et al. Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.
[2] Falko Dressler,et al. Effects and Implications of Beacon Collisions in Co-Located IEEE 802.15.4 Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[3] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[4] J. Elson,et al. Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.
[5] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[7] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[8] Francesca Cuomo,et al. Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks , 2006, SenSys '06.
[9] Jan M. Rabaey,et al. A study of energy consumption and reliability in a multi-hop sensor network , 2004, MOCO.
[10] Dijiang Huang,et al. A comparative study on anonymous 802.11n protocols , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[11] Jenhui Chen,et al. Improvement of Slots Utilization with a Stealing-TDMA Protocol for Ad Hoc Network , 2006, IEEE Vehicular Technology Conference.
[12] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[13] Gu-Yeon Wei,et al. A portable, low-power, wireless two-lead EKG system , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[14] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[15] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[16] Jiming Chen,et al. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks , 2011, IEEE Transactions on Wireless Communications.
[17] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[18] Dijiang Huang. Unlinkability Measure for IEEE 802.11 Based MANETs , 2008, IEEE Transactions on Wireless Communications.
[19] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[20] Xiang-Yang Li,et al. Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[21] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[22] Bruce Hajek,et al. Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.
[23] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[24] Dijiang Huang,et al. STARS: A Statistical Traffic Pattern Discovery System for MANETs , 2014, IEEE Transactions on Dependable and Secure Computing.
[25] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[26] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.
[27] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[28] Ramesh Govindan,et al. Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.
[29] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[30] Ness B. Shroff,et al. Energy Efficient Sleep/Wake Scheduling for Multi-Hop Sensor Networks: Non-Convexity and Approximation Algorithm , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[31] Asim Smailagic,et al. Location sensing and privacy in a context-aware computing environment , 2002, IEEE Wirel. Commun..
[32] Shu Jiang. An Anonymous MAC Protocol for Wireless Ad-hoc Networks , 2007 .
[33] Subir Biswas,et al. Distributed TDMA for privacy sensitive anonymous networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[34] Maria-Gabriella Di Benedetto,et al. UWB body area network coexistence by interference mitigation , 2009, 2009 IEEE International Conference on Ultra-Wideband.
[35] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[36] Antonio Capone,et al. RR-ALOHA, a Reliable R-ALOHA broadcast channel for ad-hoc inter-vehicle communication networks , 2002 .
[37] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[38] Fan Zhang,et al. Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping , 2011, 2011 31st International Conference on Distributed Computing Systems.
[39] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[40] J. Degesys,et al. DESYNC: Self-Organizing Desynchronization and TDMA on Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[41] Nitin H. Vaidya,et al. A mix route algorithm for mix-net in wireless mobile ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[42] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[43] Christoph P. Mayer. Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .
[44] Renjie Huang,et al. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks , 2009, Pervasive Mob. Comput..
[45] Denh Sy,et al. ODAR: On-Demand Anonymous Routing in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[46] Chun Chen,et al. Distributed privacy-preserving access control in a single-owner multi-user sensor network , 2011, 2011 Proceedings IEEE INFOCOM.
[47] Dijiang Huang. Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems , 2006, WiSe '06.
[48] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[49] Injong Rhee,et al. Z-MAC: a hybrid MAC for wireless sensor networks , 2008, TNET.
[50] Azzedine Boukerche,et al. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[51] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[52] ZeadallySherali,et al. Vehicular ad hoc networks (VANETS) , 2012 .
[53] Robert H. Deng,et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.
[54] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[55] B. Awerbuch,et al. The pulse protocol: sensor network routing and power saving , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[56] Shijue Zheng,et al. A Scheduling Algorithm for TDMA-Based MAC Protocol in Wireless Sensor Networks , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[57] Laura Marie Feeney. Exploring semantic interference in heterogeneous sensor networks , 2008, HeterSanet '08.
[58] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[59] Christofer Toumazou,et al. Energy Efficient Medium Access Protocol for Wireless Medical Body Area Sensor Networks , 2008, IEEE Transactions on Biomedical Circuits and Systems.
[60] Zhihui Chen,et al. Self organization and energy efficient TDMA MAC protocol by wake up for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[61] S. Drude,et al. Requirements and Application Scenarios for Body Area Networks , 2007, 2007 16th IST Mobile and Wireless Communications Summit.
[62] Yunhao Liu,et al. Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[63] Tao Wu,et al. Toward In-Band Self-Organization in Energy-Efficient MAC Protocols for Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[64] Frederik Armknecht,et al. Who Said That? Privacy at Link Layer , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[65] Nitin H. Vaidya,et al. A dynamic mix method for wireless ad hoc networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[66] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[67] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[68] Yunnan Wu,et al. Network Coding for the Internet and Wireless Networks , 2007, IEEE Signal Processing Magazine.
[69] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[70] Bart Preneel,et al. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[71] Flaminio Borgonovo,et al. ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services , 2004, Wirel. Networks.
[72] Injong Rhee,et al. DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.