SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Sensor node compromise detection: the location perspective
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Convertible identity-based anonymous designated ring signatures
International Journal of Security and Networks
Compromised Sensor Nodes Detection: A Quantitative Approach
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
MSN '08 Proceedings of the 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
INPAC: an enforceable incentive scheme for wireless networks using network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.00 |
Anonymous communication is very important for many wireless sensor networks, because it can be used to hide the identity of important nodes, such as the base station and a source node. In sensor networks, anonymous communication includes several important aspects, such as source anonymity, communication relationship anonymity, and base station anonymity. Existing sensor network anonymous schemes either cannot achieve all the anonymities or have large computation, storage, and communication overheads. In this paper, we propose an efficient anonymous communication protocol for sensor networks that can achieve all the anonymities while having small overheads on computation, storage, and communication. We compare our anonymous communication protocol with several existing schemes, and the results show that our protocol provides strong anonymity protection and has low overheads. Copyright © 2011 John Wiley & Sons, Ltd.