A privacy technique for providing anonymity to sensor nodes in a sensor network
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, J.-H. | - |
dc.contributor.author | Jung, Y.-H. | - |
dc.contributor.author | Ko, H. | - |
dc.contributor.author | Kim, J.-J. | - |
dc.contributor.author | Jun, M.-S. | - |
dc.date.available | 2019-04-10T10:42:50Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2011 | - |
dc.identifier.isbn | 9783642209741 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33143 | - |
dc.description.abstract | Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily. © 2011 Springer-Verlag. | - |
dc.relation.isPartOf | Communications in Computer and Information Science | - |
dc.title | A privacy technique for providing anonymity to sensor nodes in a sensor network | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1007/978-3-642-20975-8_34 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 2nd International Conference on Ubiquitous Computing and Multimedia Applications, UCMA 2011, v.150 CCIS, no.PART 1, pp.327 - 335 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-79955089734 | - |
dc.citation.conferenceDate | 2011-04-13 | - |
dc.citation.conferencePlace | Daejeon | - |
dc.citation.endPage | 335 | - |
dc.citation.number | PART 1 | - |
dc.citation.startPage | 327 | - |
dc.citation.title | 2nd International Conference on Ubiquitous Computing and Multimedia Applications, UCMA 2011 | - |
dc.citation.volume | 150 CCIS | - |
dc.contributor.affiliatedAuthor | Jun, M.-S. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.