The active badge location system
ACM Transactions on Information Systems (TOIS)
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Embedding the Internet: introduction
Communications of the ACM
Wireless integrated network sensors
Communications of the ACM
Embedded computation meets the World Wide Web
Communications of the ACM
Embedding robots into the Internet
Communications of the ACM
Communications of the ACM
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Authenticated ad hoc routing at the link layer for mobile systems
Wireless Networks
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Denial of Service in Sensor Networks
Computer
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Anonymous Addresses and Confidentiality of Location
Proceedings of the First International Workshop on Information Hiding
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
PicoRadio: Ad-Hoc Wireless Networking of Ubiquitous Low-Energy Sensor/Monitor Nodes
WVLSI '00 Proceedings of the IEEE Computer Society Annual Workshop on VLSI (WVLSI'00)
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols
Communication Networks: Fundamental Concepts and Key Architectures
Communication Networks: Fundamental Concepts and Key Architectures
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Location sensing and privacy in a context-aware computing environment
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Networked biomedical system for ubiquitous health monitoring
Mobile Information Systems - Information Assurance and Advanced Human-Computer Interfaces
Integrated biomedical system for ubiquitous health monitoring
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Hi-index | 0.00 |
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversaries. We quantify the anonymity strength of our protocol by introducing a new anonymity metric: Degree of Exposure Index. Our protocol is designed to offer flexible tradeoffs between degree of anonymity and communication-delay overhead.