Achieving Network Level Privacy in Wireless Sensor Networks†

@inproceedings{Shaikh2010AchievingNL,
  title={Achieving Network Level Privacy in Wireless Sensor Networks†},
  author={Riaz Ahmed Shaikh and Hassan Jameel and Brian J. d'Auriol and Heejo Lee and Sungyoung Lee and Young Jae Song},
  booktitle={Sensors},
  year={2010}
}
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 24 CITATIONS

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

  • IEEE Communications Surveys & Tutorials
  • 2013
VIEW 9 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Secure localization with defense against selective forwarding attacks in wireless sensor networks

  • 2011 3rd International Conference on Electronics Computer Technology
  • 2011
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

EDPPS: An Energy-efficient Data Privacy Protection Scheme for wireless sensor networks

  • 5th International Conference on Computer Sciences and Convergence Information Technology
  • 2010
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer

  • 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

An energy-efficient source-anonymity protocol in surveillance systems

  • Personal and Ubiquitous Computing
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

Entrapping adversaries for source protection in sensor networks

  • 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06)
  • 2006
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

A SiFT: an efficient method for trajectory based forwarding

  • 2005 2nd International Symposium on Wireless Communication Systems
  • 2005
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

A New Method for Node Fault Detection in Wireless Sensor Networks

P. Jiang
  • Sensors 2009,
  • 2009
VIEW 1 EXCERPT

Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks

  • IEEE Transactions on Parallel and Distributed Systems
  • 2009
VIEW 2 EXCERPTS