The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2012
DOI: 10.5120/7326-0159
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation for WSN: A Survey

Abstract: This paper presents a review of privacy-preserving techniques for wireless sensor networks (WSN). A lot of work has been done to enhance efficient use of power and resources in wireless sensor networks with the help of specific routing algorithms and different layers' protocols. As the popularity and uses of wireless sensor network increase, privacy of individuals is of very high demand. In this paper two main categories of privacy preserving techniques for WSN have been presented, data-oriented and context-or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…In this regard, WSN privacy needs have already been surveyed by several authors. Chow et al [3], Tayebi et al [4], Rios et al [5], Gupta and Chawla [6], Oualha and Olivereau [7], Conti et al [8], Bista and Chang [9], Alemdar and Ersoy [10], or Al Ameen et al [11] are representative examples of systematic literature reviews on the matter. All of them focus on the different techniques that are proposed by authors to address typical security and privacy needs.…”
Section: Introductionmentioning
confidence: 99%
“…In this regard, WSN privacy needs have already been surveyed by several authors. Chow et al [3], Tayebi et al [4], Rios et al [5], Gupta and Chawla [6], Oualha and Olivereau [7], Conti et al [8], Bista and Chang [9], Alemdar and Ersoy [10], or Al Ameen et al [11] are representative examples of systematic literature reviews on the matter. All of them focus on the different techniques that are proposed by authors to address typical security and privacy needs.…”
Section: Introductionmentioning
confidence: 99%