DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, S | - |
dc.contributor.author | Kim, J | - |
dc.contributor.author | Kim, Y | - |
dc.date.accessioned | 2017-07-19T12:33:59Z | - |
dc.date.available | 2017-07-19T12:33:59Z | - |
dc.date.created | 2016-06-15 | - |
dc.date.issued | 2016-01 | - |
dc.identifier.issn | 1820-0214 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/36040 | - |
dc.description.abstract | Protecting the location privacy of source and sink nodes in a sensor network is an important problem. Source-location privacy is to prevent event source tracking by adversaries and sink-location privacy is to protect sink nodes from adversaries who try to disrupt the sensor network. In this paper, we propose a constant-rate broadcast scheme for ensuring their location privacy. This scheme (1) equalizes traffic patterns of the sensor network to deal with eavesdropping and (2) minimizes the routing information of each sensor node to deal with node compromising. We further reduce the overhead of the proposed scheme by proposing a forwarder-driven broadcast (FdB) scheme that allows efficient multiple broadcasts with smaller buffer usage. Analysis and evaluation results show that FdB can support multiple broadcasts with small message delivery time and buffer usage. | - |
dc.language | English | - |
dc.publisher | ComSIS Consortium | - |
dc.relation.isPartOf | Computer Science and Information Systems | - |
dc.title | Preserving Source- and Sink-location Privacy in Sensor Networks | - |
dc.type | Article | - |
dc.identifier.doi | 10.2298/CSIS141027040L | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Computer Science and Information Systems, v.13, no.1, pp.115 - 130 | - |
dc.identifier.wosid | 000369553100009 | - |
dc.date.tcdate | 2019-03-01 | - |
dc.citation.endPage | 130 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 115 | - |
dc.citation.title | Computer Science and Information Systems | - |
dc.citation.volume | 13 | - |
dc.contributor.affiliatedAuthor | Kim, J | - |
dc.identifier.scopusid | 2-s2.0-85000352057 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 1 | - |
dc.description.scptc | 1 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.description.isOpenAccess | Y | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | sensor networks | - |
dc.subject.keywordAuthor | location privacy | - |
dc.subject.keywordAuthor | global eavesdropper | - |
dc.subject.keywordAuthor | compromised node | - |
dc.subject.keywordAuthor | information leak | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.