LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2016017470 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781498776332 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Call number |
621.3841/92 |
MAIN ENTRY--PERSONAL NAME |
Authors |
Rios, Ruben, |
Dates |
1983- |
TITLE STATEMENT |
Title |
Location privacy in wireless sensor networks |
Statement of responsibility, etc |
Ruben Rios, Javier Lopez, Jorge Cuellar |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication |
Boca Raton : |
Publisher |
CRC Press, |
Date |
c2017. |
PHYSICAL DESCRIPTION |
Extent |
vii, 185 p. : |
Other Details |
ill. ; |
Size |
24 cm. |
SERIES STATEMENT |
Series statement |
Series in security, privacy, and trust |
CONTENTS |
Contents |
Cover; Half Title; Title Page; Copyright Page; Table of Contents; 1: Introduction; 1.1 Wireless Sensor Networks ; 1.2 Overview of Security in Wireless Sensor Networks; 1.3 Privacy in Wireless Sensor Networks; 1.3.1 User-Centric Privacy ; 1.3.2 Network-Centric Privacy ; 1.3.2.1 Content-Oriented Privacy. 1.3.2.2 Context-Oriented Privacy 1.4 Location Privacy in Wireless Sensor Networks; 1.4.1 Motivating Scenario ; 1.4.2 Source-Location Privacy ; 1.4.3 Receiver-Location Privacy. 1.5 Book Outline 2: Suitability of Computer-Based Anonymity Systems; 2.1 Anonymous Communications Systems; 2.1.1 Anonymity Terminology; 2.1.2 Anonymity Properties in Wireless Sensor Network; 2.1.3 Classification of Solutions; 2.2 Centralized Schemes; 2.2.1 Single-Proxy; 2.2.2 Mixes; 2.2.3 Onion Routing and Tor; 2.3 Decentralized Schemes; 2.3.1 Crowds and Hordes; 2.3.2 GNUnet Anonymity Protocol; 2.3.3 DC-nets and Herbivore; 2.4 Evaluation; 3: Analysis of Location Privacy Solutions in WSNs. 3.1 Node Identity Protection 3.1.1 Pool of Pseudonyms ; 3.1.2 Cryptographic Pseudonyms ; 3.2 Source Protection ; 3.2.1 Local Adversaries. 3.2.1.1 Undirected Random Paths 3.2.1.2 Directed Random Paths ; 3.2.1.3 Network Loop Methods; 3.2.1.4 Fake Data Sources ; 3.2.2 Global Adversaries. |
SUMMARY |
Summary |
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Location-based services |
General |
Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Internet of things |
General |
Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Wireless sensor networks |
General |
Security measures |
ADDED ENTRY |
Name |
Lopez, Javier |
ADDED ENTRY |
Name |
Cuellar, Jorge |
ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://uowd.box.com/s/oqycxyaz9goe94zm7ikvzhmisofqoa9b |
Public note |
Location Map |
MAIN ENTRY--PERSONAL NAME |
-- |
60591 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
60592 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
23399 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
60593 |
ADDED ENTRY |
-- |
60594 |
ADDED ENTRY |
-- |
60595 |