Location privacy in wireless sensor networks
By: Rios, Ruben
Title By: Lopez, Javier | Cuellar, Jorge
Material type: BookSeries: Series in security, privacy, and trust.Publisher: Boca Raton : CRC Press, c2017.Description: vii, 185 p. : ill. ; 24 cm.ISBN: 9781498776332Subject(s): Location-based services -- Security measures | Internet of things -- Security measures | Wireless sensor networks -- Security measuresDDC classification: 621.3841/92 Online resources: Location MapItem type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 621.384192 RI LO (Browse shelf) | Available | T0055047 |
, Shelving location: Main Collection Close shelf browser
621.384156 RA DI Radio wave propagation and channel modeling for Earth-space systems | 621.38418 QU BU Build your own transistor radios : | 621.384191 HA ND Handbook of position location : | 621.384192 RI LO Location privacy in wireless sensor networks | 621.384192 YU TA Tag counting and monitoring in large-scale RFID systems : | 621.3845 AD VA Advanced wireless sensing techniques for 5G networks | 621.3845 MO BI Mobile communications handbook / |
Includes bibliographical references and index.
Cover; Half Title; Title Page; Copyright Page; Table of Contents; 1: Introduction; 1.1 Wireless Sensor Networks ; 1.2 Overview of Security in Wireless Sensor Networks; 1.3 Privacy in Wireless Sensor Networks; 1.3.1 User-Centric Privacy ; 1.3.2 Network-Centric Privacy ; 1.3.2.1 Content-Oriented Privacy. 1.3.2.2 Context-Oriented Privacy 1.4 Location Privacy in Wireless Sensor Networks; 1.4.1 Motivating Scenario ; 1.4.2 Source-Location Privacy ; 1.4.3 Receiver-Location Privacy. 1.5 Book Outline 2: Suitability of Computer-Based Anonymity Systems; 2.1 Anonymous Communications Systems; 2.1.1 Anonymity Terminology; 2.1.2 Anonymity Properties in Wireless Sensor Network; 2.1.3 Classification of Solutions; 2.2 Centralized Schemes; 2.2.1 Single-Proxy; 2.2.2 Mixes; 2.2.3 Onion Routing and Tor; 2.3 Decentralized Schemes; 2.3.1 Crowds and Hordes; 2.3.2 GNUnet Anonymity Protocol; 2.3.3 DC-nets and Herbivore; 2.4 Evaluation; 3: Analysis of Location Privacy Solutions in WSNs. 3.1 Node Identity Protection 3.1.1 Pool of Pseudonyms ; 3.1.2 Cryptographic Pseudonyms ; 3.2 Source Protection ; 3.2.1 Local Adversaries. 3.2.1.1 Undirected Random Paths 3.2.1.2 Directed Random Paths ; 3.2.1.3 Network Loop Methods; 3.2.1.4 Fake Data Sources ; 3.2.2 Global Adversaries.
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.