Filters








131 Hits in 10.1 sec

From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks

Honglong Chen, Wei Lou
2010 International Performance Computing and Communications Conference  
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting.  ...  In this paper, we address the importance of location privacy of both source and sink and propose four schemes to protect them simultaneously.  ...  In this paper we propose four end-to-end location privacy protection techniques to protect against a local eavesdropper who might breach the location privacy of a source or sink, that is, end-to-end location  ... 
doi:10.1109/pccc.2010.5682341 dblp:conf/ipccc/ChenL10 fatcat:p4sb6qrr3rdbffibkii3gqgwtu

MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks

Yawar Bangash, Lingfang Zeng, Dan Feng
2015 2015 IEEE International Conference on Networking, Architecture and Storage (NAS)  
Different approaches are there to provide location privacy in wireless sensor networks (WSN).  ...  The purpose is to hide the location of BS from outside/inside attacker in any shape.  ...  Their scheme aims to protect the data privacy and data integrity. In their method there is no such scheme to protect the base station location privacy.  ... 
doi:10.1109/nas.2015.7255210 dblp:conf/nas/BangashZF15 fatcat:nlpbvya7g5ey5kazuxqv6xoz6a

MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks

Yawar Abbas Bangash, Ling-Fang Zeng, Dan Feng
2017 Journal of Computer Science and Technology  
Different approaches are there to provide location privacy in wireless sensor networks (WSN).  ...  The purpose is to hide the location of BS from outside/inside attacker in any shape.  ...  Their scheme aims to protect the data privacy and data integrity. In their method there is no such scheme to protect the base station location privacy.  ... 
doi:10.1007/s11390-017-1777-0 fatcat:kubkrun2sbd25fb7ny7o5x2sdm

(Un)Suitability of Anonymous Communication Systems to WSN

Ruben Rios, Javier Lopez
2013 IEEE Systems Journal  
Recently, the privacy preservation problem has also been considered in the realm of wireless sensor networks (WSNs) due to their imminent adoption in real-world scenarios.  ...  A special challenge that arises from the analysis of the flow of sensor nodes' communications is the location privacy problem.  ...  Here we concentrate on determining which design goals of traditional anonymity systems are significant in the protection of location privacy in sensor networks.  ... 
doi:10.1109/jsyst.2012.2221956 fatcat:ekd3frnugfeebdsmqs2adwjq4q

Panel: Authentication in Constrained Environments [chapter]

Mike Burmester, Virgil Gligor, Evangelos Kranakis, Doug Tygar, Yuliang Zheng
2006 Lecture Notes in Computer Science  
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES'05 Workshop. These were transcribed from hand-written notes.  ...  Authentication is designed to protect against man-in-the-middle attacks. If one end is compromised, what will happen to them? If adversary captures node.  ...  I wish to set-up wireless overlay networks to set-up new networks quickly and compensate on attacks on wire-based networks. -Issue: Key revocation. How to revoke keys?  ... 
doi:10.1007/11801412_18 fatcat:mmq55keof5evnomwehttt3ihre

Immanent Domain

Dana Cuff
2003 Journal of Architectural Education  
From cell phones to wireless local area networks, smart buildings to embedded vehicular computers, an invisible web of digital technology already lies across the visible world creating new space for work  ...  Machines that t the human environment instead of forcing humans to enter theirs will make using a computer as refreshing as taking a walk in the woods. Mark Weiser  ...  Privacy, at the other end of the traditional polarity, has been de ned as the achievement of desired levels of boundary control and access. 14 Thus, I have privacy if I can keep unwanted visitors from  ... 
doi:10.1162/104648803322336575 fatcat:5vejqzfacrhmvouv2w4ck3fncq

What we can do to save humanity in the coming era of global eavesdroppers

Victor Christianto, Florentin Smarandache
2018 Figshare  
In this paper, we tried to draw a fair assessment on things which will take place soon with the coming era of IoT, 5G technology, global eavesdropping and all that.  ...  Perhaps you can consider us as: "techno-realists."2 This paper was written in the same spirit of Jonathan L. Zittrain's book The Future of Internet and how to stop it.  ...  Acknowledgment These authors would like to express their sincere gratitude to editors of RIEECE 2018.  ... 
doi:10.6084/m9.figshare.7048649.v1 fatcat:n4fxm4mla5gnzcdc6zfdivqaeu

Partially Homomorphic Encryption Scheme for Real-Time Image Stream

Angel Vazquez-Salazar, Ali Ahmadinia
2021 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)  
However, by encrypting the stream of these IoT cameras, we have a chance to truly retain privacy and ownership of our data.  ...  By only providing encrypted services to authenticate a user by login credentials, there still is a vulnerability in raw stream.  ...  For others, this is simply a burden and a violation of rights since they want to protect their privacy in any way possible.  ... 
doi:10.1109/cscloud-edgecom52276.2021.00023 fatcat:4p3agxxgjnc6nmhcefskdzvnx4

Somatic Surveillance: Corporeal Control through Information Networks

Torin Monahan, Tyler Wall
2002 Surveillance & Society  
The argument is that in present and projected forms, somatic surveillance systems abstract bodies and physiological systems from social contexts, facilitating hyper-individualized control and the commodification  ...  Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices  ...  allow for the easy portability of medical records from site to site; (3) it relies on Internet interfaces to access and manipulate patients' records, which are technically located in a central location  ... 
doi:10.24908/ss.v4i3.3446 fatcat:c2qju7nzpjhydbmcuwqk33xq5e

Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements

A. Michael Froomkin
2014 Social Science Research Network  
a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead  ...  Koonin for sharing his slides from his stimulatingand, frankly, terrifyingtalk about CUSP at the Simons Foundation in March, 2013 which inspired this article, and also for providing additional information  ...  (2) Sensors aimed at private property from public locations.  ... 
doi:10.2139/ssrn.2400736 fatcat:5hpcg2ush5a45emfwkgtodnini

Invisible computing: automatically using the many bits of data we create

G. Borriello
2008 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Even the devices themselves can keep track of their location and radio interactions, even without user involvement. The challenge of invisible computing is to make this wealth of data useful.  ...  LABSCAPE automates the record keeping required of experimenters in a cell biology laboratory. The second example looks at more ad hoc interactions.  ...  of authentication, security and privacy protection.  ... 
doi:10.1098/rsta.2008.0128 pmid:18672454 fatcat:sno2xop4uvb3bnlpusgs5eee3q

D2.4: Report on co-creation of services

Paulien Coppens, Laurence Claeys, Wiebke Herding, Gavin McCrory, Panagiota Syropoulou, Christodoulos Keratidis
2018 Zenodo  
In this deliverable the user research and the different co-creation activities that were carried out in the hackAIR project in the first half of the project (M1-M18) are described.  ...  Stephan is very happy to see that the sensors are wireless and he doesn't have to attach any power supply to it. He can just stick it somewhere and start measuring.  ...  ' or 'I have asthma'.  End users only have access to the general air quality data and not to their own uploaded data.  Sensor data from citizens.  ... 
doi:10.5281/zenodo.2273451 fatcat:m5ineq7pgfg2jldfoukpweqfme

Network Organization and Governance [chapter]

2018 CRC Handbook of Modern Telecommunications  
Design of Wireless Sensor Network Applications, Hardware and Software Sajid Hussain A wireless sensor network (WSN) generally consists of a large number of sensor nodes, called motes, which could be  ...  For sensor networks, the end user does not require all the data in the network because: (i) the data from neighboring nodes are highly correlated, making the data redundant, and (ii) the end user typically  ...  point, and remote diagnostics cannot be analyzed end to end.  ... 
doi:10.1201/9781420078084-9 fatcat:eyixyd27nzbmthwoqybadgqz2e

Fog Assisted Cloud Models for Smart Grid Architectures- Comparison Study and Optimal Deployment [article]

Md. Muzakkir Hussain, Mohammad Saad Alam, M.M. Sufyan Beg
2018 arXiv   pre-print
Fog Computing (FC) extends the processing capabilities into the edge of the network, offering location-awareness, low latency, and latency-sensitive analytics for mission critical requirements of SG.  ...  , and network cost.  ...  Security Concerns: In the context of SG applications security is defined to mean the safety and stability of the power grid, rather than protection against malice, as the latter comes under the privacy  ... 
arXiv:1805.09254v1 fatcat:bnddfokhqbavvdqg36zec4j6jq

Net Neutrality and Mobile App Innovation in Denmark and Netherlands 2010–2016

Roslyn Layton
2019 Review of Network Economics  
The focus in on mobile networks because it allowed the most consistent data across countries.  ...  Additionally, the explosion of mobile apps from countries with no net neutrality rules and the general dearth of mobile apps from countries which have had hard rules for years runs counter to expected  ...  Section 222: Protecting Consumer Privacy.  ... 
doi:10.1515/rne-2019-0012 fatcat:fgldv7wx7fhn5h3eoe5yflzmta
« Previous Showing results 1 — 15 out of 131 results