Research Article
Providing Anonymity in Wireless Sensor Networks
@INPROCEEDINGS{10.1109/PERSER.2007.4283904, author={Yi Ouyang and Zhengyi Le and Yurong Xu and Nikos Triandopoulos and Sheng Zhang and James Ford and Fillia Makedon}, title={Providing Anonymity in Wireless Sensor Networks}, proceedings={1st International IEEE Conference on Pervasive Services}, publisher={IEEE}, proceedings_a={ICPS}, year={2007}, month={8}, keywords={Base stations Capacitive sensors Cryptography Educational institutions Monitoring Protection Routing protocols Telecommunication traffic Tracking Wireless sensor networks}, doi={10.1109/PERSER.2007.4283904} }
- Yi Ouyang
Zhengyi Le
Yurong Xu
Nikos Triandopoulos
Sheng Zhang
James Ford
Fillia Makedon
Year: 2007
Providing Anonymity in Wireless Sensor Networks
ICPS
IEEE
DOI: 10.1109/PERSER.2007.4283904
Abstract
ensor networks are often used to monitor sensitive information from the environment or track sensitive objects' movements. Anonymity has become an important problem in sensor networks, and has been widely researched in wireless ad hoc and wired networks. The limited capacity and resources of current sensor networks have brought new challenges to anonymity research. In this paper, two efficient methods are proposed based on using a one-way hash chain to dynamically change the identity of sensor nodes in order to provide anonymity, and their anonymity properties are analyzed and compared.
Copyright © 2007–2024 IEEE