2013
DOI: 10.1155/2013/369502
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Care Architecture in Wireless Sensor Networks

Abstract: With regard to the spread of innovative technologies, wireless sensor networks (WSNs) have great research interest in recent years. Although the WSN service is being facilitated, security related accidents are continuously incurring. In particular, many activities between mobile devices and sensor nodes take place without too much of protection of privacy information. To avoid these risks in WSN, we do need to devise the privacy care architecture to prevent the private data loss or breach especially in WSN. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
“…x x [29] x [31] x [21] x x [34] x x [20] x [49] x [53] x [16] x x [46] x [50] x [35] x x [54] x [13] x x [14] x x [24] x x [38] x [18] x x [47] x [48] x [26] x [42] x x [27] x [45] x [15] x x [19] [32]…”
Section: Journal Of Sensorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure localization Hierarchical sensor network security positioning [7], lightweight security localization method [8].…”
Section: The Main Research Fieldsmentioning
confidence: 99%
“…Sensor-enabled products and their networks are becoming commonplace, and central to everyday life, e.g., healthcare, smart homes, object tracking and monitoring, and so on. Moreover, according to the latest finding "wireless sensor networks 2012-2021" [2] -WSN businesses will grow rapidly to over two billion US dollars for the future systems in 2022.…”
Section: Introductionmentioning
confidence: 99%