2011
DOI: 10.1007/978-3-642-20975-8_34
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
See 3 more Smart Citations
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
“…x x [29] x [31] x [21] x x [34] x x [20] x [49] x [53] x [16] x x [46] x [50] x [35] x x [54] x [13] x x [14] x x [24] x x [38] x [18] x x [47] x [48] x [26] x [42] x x [27] x [45] x [15] x x [19] [32]…”
Section: Journal Of Sensorsmentioning
confidence: 99%
See 2 more Smart Citations
“…There are various schemes to overcome context threats from the global adversary model [1]. For instance, separate path routing allows each packet to travel towards the sink using a different route [23]; network location anonymization uses a fake identity for the source [24,25]; network coding breaks down each packet into smaller pieces that follow different routes to the sink [26,27]; and dummy data sources create dummy sources that generate fake traffic, which confuses the adversary about the identity and location of the source [28,29]. Using fake traffic is by far the most effective method against global adversaries because it uses different types of packets that appear similar from the outside.…”
Section: Introductionmentioning
confidence: 99%