2013
DOI: 10.1007/978-3-642-40009-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Enhancing Technologies for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…Remote sensors need to talk with each other through remote transmission. Remote communications are definitely not hard to be taken after or listened silently by intruder [4].…”
Section: Introductionmentioning
confidence: 99%
“…Remote sensors need to talk with each other through remote transmission. Remote communications are definitely not hard to be taken after or listened silently by intruder [4].…”
Section: Introductionmentioning
confidence: 99%
“…Studying existing solutions in similar domains such as wireless sensor networks and MANET shows those approaches cannot be applied directly into the domain of smart home due to producing undesirable extra delay or increasing the energy consumption [8], [9]. Thus, in this paper, we propose a Hybrid Energy-Efficient Privacy Preserving Scheme which is improved version of dummy packet injection approach [10], [11] and a random timing interval generator for determining the transmitting slot. Suggested solution is a decision-making algorithm based on probability theorem and it works by aim of maximizing the confusion level of the attack in its way to discover the correct pattern.…”
Section: Introductionmentioning
confidence: 99%
“…Disastrous results of this type of attacks, such as transferring the data to other parties from criminal organizations to insurance companies or spammers without permission and consent, cannot be avoided because the victim does not know when the attack is happening [13]. Fingerprint and Timing-based Snooping (FATS) is a robust attack to make adversaries able to capture wireless signals emitted from a smart home from somewhere outside of the home and stay undetectable as a nature of any kind of passive attacks [10]. Attackers interfere signals for a while and once the algorithm is trained enough, identities of smart devices and their locations will be clear, afterward, daily activities of residents of the home will be observable for attackers.…”
Section: Introductionmentioning
confidence: 99%
“…In this regard, WSN privacy needs have already been surveyed by several authors. Chow et al [3], Tayebi et al [4], Rios et al [5], Gupta and Chawla [6], Oualha and Olivereau [7], Conti et al [8], Bista and Chang [9], Alemdar and Ersoy [10], or Al Ameen et al [11] are representative examples of systematic literature reviews on the matter. All of them focus on the different techniques that are proposed by authors to address typical security and privacy needs.…”
Section: Introductionmentioning
confidence: 99%