Abstract | ||
---|---|---|
Sensor networks are often used to monitor sensitive information from the environment or track sensitive objects' movements. Anonymity has become an important problem in sensor networks, and has been widely researched in wireless ad hoc and wired networks. The limited capacity and resources of current sensor networks have brought new challenges to anonymity research. In this paper, two efficient methods are proposed based on using a one-way hash chain to dynamically change the identity of sensor nodes in order to provide anonymity, and their anonymity properties are analyzed and compared. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1109/PERSER.2007.4283904 | ICPS |
Keywords | Field | DocType |
information monitoring,anonymity,one-way hash chain,sensor node identity,wireless sensor networks,telecommunication security,capacitive sensors,cryptography,sensor network,tracking,wireless sensor network,base stations,hash chain,routing protocols | Sensor node,Key distribution in wireless sensor networks,Visual sensor network,Computer network,Anonymity,Wireless ad hoc network,Mobile wireless sensor network,Engineering,Wireless sensor network,Sensor web | Conference |
ISBN | Citations | PageRank |
1-4244-1326-5 | 15 | 0.64 |
References | Authors | |
9 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yi Ouyang | 1 | 157 | 12.00 |
Yurong Xu | 2 | 158 | 13.68 |
Yurong Xu | 3 | 158 | 13.68 |
Nikos Triandopoulos | 4 | 867 | 38.74 |
Sheng Zhang | 5 | 166 | 9.10 |
James Ford | 6 | 227 | 16.26 |
Fillia Makedon | 7 | 1676 | 201.73 |