EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Reliable bursty convergecast in wireless sensor networks
Computer Communications
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
A conceptual model for privacy policies
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wireless sensor networks (WSNs) in which the location of sensors is a key information are becoming more and more important. Moreover, in many cases privacy is a key issues for such network which can be the target of different kind of security attacks. In this paper we present an approach, named Cross Layer Protocol (CLP), for improving data quality based on an integrated solution that considers a sound privacy management policy coupled with a secure localization protocol. More specifically, CLP exploits consistency between the information on nodes behavior gathered during localization phase and privacy compliance verification to evaluate nodes reputation. Finally CLP effectiveness is evaluated by means of a set of simulations.