Abstract | ||
---|---|---|
Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/icc.2011.5963399 | Communications |
Keywords | Field | DocType |
data privacy,telecommunication security,token networks,wireless sensor networks,attack mitigation,network security,single-owner multiuser commercial sensor networks,token-based privacy preservation scheme,wireless sensor networks | Key distribution in wireless sensor networks,Computer security,Reuse,Computer science,Telecommunication security,Computer network,Peer to peer computing,Information privacy,Wireless sensor network,Security token,Overhead (business) | Conference |
ISSN | ISBN | Citations |
1550-3607 E-ISBN : 978-1-61284-231-8 | 978-1-61284-231-8 | 0 |
PageRank | References | Authors |
0.34 | 16 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shafiei, H. | 1 | 32 | 5.30 |
A. Khonsari | 2 | 136 | 17.89 |
Baharan Mirzasoleiman | 3 | 0 | 0.34 |
M. Ould-Khaoua | 4 | 440 | 43.78 |