Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/4386
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Chen, H | - |
dc.creator | Lou, W | - |
dc.date.accessioned | 2014-12-11T08:23:56Z | - |
dc.date.available | 2014-12-11T08:23:56Z | - |
dc.identifier.isbn | 978-1-4244-9330-2 | - |
dc.identifier.issn | 1097-2641 | - |
dc.identifier.uri | http://hdl.handle.net/10397/4386 | - |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.rights | © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
dc.subject | Monitoring | en_US |
dc.subject | Position measurement | en_US |
dc.subject | Privacy | en_US |
dc.subject | Receivers | en_US |
dc.subject | Routing | en_US |
dc.subject | Wireless communication | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.title | From nowhere to somewhere : protecting end-to-end location privacy in wireless sensor networks | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | 10.1109/PCCC.2010.5682341 | - |
dcterms.abstract | Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting. By eavesdropping the sensor nodes' transmissions and tracing the packets' trajectories in the WSNs, an adversary can capture the location of a source or sink eventually. Thus, the location privacy of both source and sink becomes a significant issue in WSNs. Previous research only focuses on the location privacy of the source or sink independently. In this paper, we address the importance of location privacy of both source and sink and propose four schemes to protect them simultaneously. Simulation results illustrate the effectiveness of our proposed schemes. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | IPCCC 2010 : 29th IEEE International Performance Computing and Communications Conference : proceedings, 1-8 December 2010, Albuquerque, NM, USA, p. 1-8 | - |
dcterms.issued | 2010 | - |
dc.identifier.scopus | 2-s2.0-79551512466 | - |
dc.identifier.rosgroupid | r54593 | - |
dc.description.ros | 2010-2011 > Academic research: refereed > Refereed conference paper | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | OA_IR/PIRA | en_US |
dc.description.pubStatus | Published | en_US |
Appears in Collections: | Conference Paper |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ipccc2010a.pdf | Pre-published version | 334.08 kB | Adobe PDF | View/Open |
Page views
139
Last Week
0
0
Last month
Citations as of Apr 14, 2024
Downloads
211
Citations as of Apr 14, 2024
SCOPUSTM
Citations
34
Last Week
1
1
Last month
0
0
Citations as of Apr 19, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.