2011 International Conference on Ubiquitous Computing and Multimedia Applications 2011
DOI: 10.1109/ucma.2011.11
|View full text |Cite
|
Sign up to set email alerts
|

A New Privacy Scheme for Providing Anonymity Technique on Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…One way to preserve node ID anonymity in WSNs is to use dynamic pseudonyms to identify nodes when they communicate. There are several methods proposed to generate and verify the dynamic pseudonyms, such as pseudonym sub-ranges [2], hash functions [2,3,4,5,6], onion routing and label switching [23], Phantom ID [24], Bloom Filters [25] and orthogonal code [26]. The most popular method is the use of hash functions owing to their attractive properties such as low computational costs.…”
Section: Use Of Hash Functions For Node Id Anonymity In Wsnsmentioning
confidence: 99%
“…One way to preserve node ID anonymity in WSNs is to use dynamic pseudonyms to identify nodes when they communicate. There are several methods proposed to generate and verify the dynamic pseudonyms, such as pseudonym sub-ranges [2], hash functions [2,3,4,5,6], onion routing and label switching [23], Phantom ID [24], Bloom Filters [25] and orthogonal code [26]. The most popular method is the use of hash functions owing to their attractive properties such as low computational costs.…”
Section: Use Of Hash Functions For Node Id Anonymity In Wsnsmentioning
confidence: 99%