000 | 02517nam a22002778a 4500 | ||
---|---|---|---|
999 |
_c29992 _d29992 |
||
001 | 64988 | ||
010 | _a 2016017470 | ||
020 | _a9781498776332 | ||
040 | _aDLC | ||
082 | 0 | 0 | _a621.3841/92 |
100 | 1 |
_aRios, Ruben, _d1983- _960591 |
|
245 | 1 | 0 |
_aLocation privacy in wireless sensor networks _cRuben Rios, Javier Lopez, Jorge Cuellar |
260 |
_aBoca Raton : _bCRC Press, _cc2017. |
||
300 |
_avii, 185 p. : _bill. ; _c24 cm. |
||
490 | 0 | _aSeries in security, privacy, and trust | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aCover; Half Title; Title Page; Copyright Page; Table of Contents; 1: Introduction; 1.1 Wireless Sensor Networks ; 1.2 Overview of Security in Wireless Sensor Networks; 1.3 Privacy in Wireless Sensor Networks; 1.3.1 User-Centric Privacy ; 1.3.2 Network-Centric Privacy ; 1.3.2.1 Content-Oriented Privacy. 1.3.2.2 Context-Oriented Privacy 1.4 Location Privacy in Wireless Sensor Networks; 1.4.1 Motivating Scenario ; 1.4.2 Source-Location Privacy ; 1.4.3 Receiver-Location Privacy. 1.5 Book Outline 2: Suitability of Computer-Based Anonymity Systems; 2.1 Anonymous Communications Systems; 2.1.1 Anonymity Terminology; 2.1.2 Anonymity Properties in Wireless Sensor Network; 2.1.3 Classification of Solutions; 2.2 Centralized Schemes; 2.2.1 Single-Proxy; 2.2.2 Mixes; 2.2.3 Onion Routing and Tor; 2.3 Decentralized Schemes; 2.3.1 Crowds and Hordes; 2.3.2 GNUnet Anonymity Protocol; 2.3.3 DC-nets and Herbivore; 2.4 Evaluation; 3: Analysis of Location Privacy Solutions in WSNs. 3.1 Node Identity Protection 3.1.1 Pool of Pseudonyms ; 3.1.2 Cryptographic Pseudonyms ; 3.2 Source Protection ; 3.2.1 Local Adversaries. 3.2.1.1 Undirected Random Paths 3.2.1.2 Directed Random Paths ; 3.2.1.3 Network Loop Methods; 3.2.1.4 Fake Data Sources ; 3.2.2 Global Adversaries. | |
520 | _aToday all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. | ||
650 | 0 |
_aLocation-based services _xSecurity measures _960592 |
|
650 | 0 |
_aInternet of things _xSecurity measures _923399 |
|
650 | 0 |
_aWireless sensor networks _xSecurity measures _960593 |
|
700 | 1 |
_aLopez, Javier _960594 |
|
700 | 1 |
_aCuellar, Jorge _960595 |
|
856 |
_uhttps://uowd.box.com/s/oqycxyaz9goe94zm7ikvzhmisofqoa9b _zLocation Map |
||
942 |
_cREGULAR _2ddc |