DOI: 10.1007/978-3-540-73275-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Target Localisation in Sensor Networks with Location Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Many of them [15,30,49] propose solutions that protect the measures in consensus networks by introducing in the rst step a random noise that decreases during the protocol so that a consensus close to the correct one is reached. Other works in privacy preserving data fusion were addressed in [56,57]. In these works, the authors use additive blinding or secret sharing to estimate the position of one or more targets, by computing the average of the measurements of multiple sensors.…”
Section: Contributionmentioning
confidence: 99%
“…Many of them [15,30,49] propose solutions that protect the measures in consensus networks by introducing in the rst step a random noise that decreases during the protocol so that a consensus close to the correct one is reached. Other works in privacy preserving data fusion were addressed in [56,57]. In these works, the authors use additive blinding or secret sharing to estimate the position of one or more targets, by computing the average of the measurements of multiple sensors.…”
Section: Contributionmentioning
confidence: 99%
“…Related works in this area include [23], which addresses the issue of privacy when fusing data coming from sensors that are assigned to multiple event detection tasks, and [20], which describes a data dissemination technique to ensure that the locations of sensors in the network are not learned by an enemy.…”
Section: Related Workmentioning
confidence: 99%
“…Some approaches allow nodes to deliver data, while protecting location information with pseudonyms, since tracking a data source without its real identity is more difficult [49]. Other approaches achieve similar goals with physical measurements [50].…”
Section: Confidentiality Integrity Availabilitymentioning
confidence: 99%