Normal view MARC view ISBD view

Location privacy in wireless sensor networks

By: Rios, Ruben, 1983-
Title By: Lopez, Javier | Cuellar, Jorge
Material type: BookSeries: Series in security, privacy, and trust.Publisher: Boca Raton : CRC Press, c2017.Description: vii, 185 p. : ill. ; 24 cm.ISBN: 9781498776332Subject(s): Location-based services -- Security measures | Internet of things -- Security measures | Wireless sensor networks -- Security measuresDDC classification: 621.3841/92 Online resources: Location Map
Summary:
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
621.384192 RI LO (Browse shelf) Available T0055047
Total holds: 0

Includes bibliographical references and index.

Cover; Half Title; Title Page; Copyright Page; Table of Contents; 1: Introduction; 1.1 Wireless Sensor Networks ; 1.2 Overview of Security in Wireless Sensor Networks; 1.3 Privacy in Wireless Sensor Networks; 1.3.1 User-Centric Privacy ; 1.3.2 Network-Centric Privacy ; 1.3.2.1 Content-Oriented Privacy. 1.3.2.2 Context-Oriented Privacy 1.4 Location Privacy in Wireless Sensor Networks; 1.4.1 Motivating Scenario ; 1.4.2 Source-Location Privacy ; 1.4.3 Receiver-Location Privacy. 1.5 Book Outline 2: Suitability of Computer-Based Anonymity Systems; 2.1 Anonymous Communications Systems; 2.1.1 Anonymity Terminology; 2.1.2 Anonymity Properties in Wireless Sensor Network; 2.1.3 Classification of Solutions; 2.2 Centralized Schemes; 2.2.1 Single-Proxy; 2.2.2 Mixes; 2.2.3 Onion Routing and Tor; 2.3 Decentralized Schemes; 2.3.1 Crowds and Hordes; 2.3.2 GNUnet Anonymity Protocol; 2.3.3 DC-nets and Herbivore; 2.4 Evaluation; 3: Analysis of Location Privacy Solutions in WSNs. 3.1 Node Identity Protection 3.1.1 Pool of Pseudonyms ; 3.1.2 Cryptographic Pseudonyms ; 3.2 Source Protection ; 3.2.1 Local Adversaries. 3.2.1.1 Undirected Random Paths 3.2.1.2 Directed Random Paths ; 3.2.1.3 Network Loop Methods; 3.2.1.4 Fake Data Sources ; 3.2.2 Global Adversaries.

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.

Powered by Koha