2015
DOI: 10.1109/twc.2014.2347311
|View full text |Cite
|
Sign up to set email alerts
|

Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…The voltage (i.e., 3 V(volt)) and the current (i.e., 1.8 µA (microamp)) values are directly obtained from TelosB data-sheet [32]. By multiplying the values of V and I with the execution time (t), we can determine the amount of energy required to execute the ECC, AES, and SHA-1 operations [25], [35], [36]. As we can seen in Table II, the total amount of energy consumed in ECC, AES and SHA-1 is (≈) 15,148 µJ.…”
Section: B Evaluationmentioning
confidence: 99%
“…The voltage (i.e., 3 V(volt)) and the current (i.e., 1.8 µA (microamp)) values are directly obtained from TelosB data-sheet [32]. By multiplying the values of V and I with the execution time (t), we can determine the amount of energy required to execute the ECC, AES, and SHA-1 operations [25], [35], [36]. As we can seen in Table II, the total amount of energy consumed in ECC, AES and SHA-1 is (≈) 15,148 µJ.…”
Section: B Evaluationmentioning
confidence: 99%
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
“…Both [19] Source [32] x (query and query results) x [23] Source [17] x (query and query results) [43] [36] x [33] x (query and query results) [37] x [40] x [41] 6 Journal of Sensors Eavesdropping/traffic analysis Query revealing Authentication and privacy: tracking (default)/impersonation (when noted) [44] x x [39] x [30] x x [22] x [28] x [25] [52]…”
Section: Journal Of Sensorsmentioning
confidence: 99%
See 2 more Smart Citations