A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks
2010
International Performance Computing and Communications Conference
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting. ...
In this paper, we address the importance of location privacy of both source and sink and propose four schemes to protect them simultaneously. ...
In this paper we propose four end-to-end location privacy protection techniques to protect against a local eavesdropper who might breach the location privacy of a source or sink, that is, end-to-end location ...
doi:10.1109/pccc.2010.5682341
dblp:conf/ipccc/ChenL10
fatcat:p4sb6qrr3rdbffibkii3gqgwtu
MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks
2015
2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
Different approaches are there to provide location privacy in wireless sensor networks (WSN). ...
The purpose is to hide the location of BS from outside/inside attacker in any shape. ...
Their scheme aims to protect the data privacy and data integrity. In their method there is no such scheme to protect the base station location privacy. ...
doi:10.1109/nas.2015.7255210
dblp:conf/nas/BangashZF15
fatcat:nlpbvya7g5ey5kazuxqv6xoz6a
MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks
2017
Journal of Computer Science and Technology
Different approaches are there to provide location privacy in wireless sensor networks (WSN). ...
The purpose is to hide the location of BS from outside/inside attacker in any shape. ...
Their scheme aims to protect the data privacy and data integrity. In their method there is no such scheme to protect the base station location privacy. ...
doi:10.1007/s11390-017-1777-0
fatcat:kubkrun2sbd25fb7ny7o5x2sdm
(Un)Suitability of Anonymous Communication Systems to WSN
2013
IEEE Systems Journal
Recently, the privacy preservation problem has also been considered in the realm of wireless sensor networks (WSNs) due to their imminent adoption in real-world scenarios. ...
A special challenge that arises from the analysis of the flow of sensor nodes' communications is the location privacy problem. ...
Here we concentrate on determining which design goals of traditional anonymity systems are significant in the protection of location privacy in sensor networks. ...
doi:10.1109/jsyst.2012.2221956
fatcat:ekd3frnugfeebdsmqs2adwjq4q
Panel: Authentication in Constrained Environments
[chapter]
2006
Lecture Notes in Computer Science
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES'05 Workshop. These were transcribed from hand-written notes. ...
Authentication is designed to protect against man-in-the-middle attacks. If one end is compromised, what will happen to them? If adversary captures node. ...
I wish to set-up wireless overlay networks to set-up new networks quickly and compensate on attacks on wire-based networks. -Issue: Key revocation. How to revoke keys? ...
doi:10.1007/11801412_18
fatcat:mmq55keof5evnomwehttt3ihre
Immanent Domain
2003
Journal of Architectural Education
From cell phones to wireless local area networks, smart buildings to embedded vehicular computers, an invisible web of digital technology already lies across the visible world creating new space for work ...
Machines that t the human environment instead of forcing humans to enter theirs will make using a computer as refreshing as taking a walk in the woods. Mark Weiser ...
Privacy, at the other end of the traditional polarity, has been de ned as the achievement of desired levels of boundary control and access. 14 Thus, I have privacy if I can keep unwanted visitors from ...
doi:10.1162/104648803322336575
fatcat:5vejqzfacrhmvouv2w4ck3fncq
What we can do to save humanity in the coming era of global eavesdroppers
2018
Figshare
In this paper, we tried to draw a fair assessment on things which will take place soon with the coming era of IoT, 5G technology, global eavesdropping and all that. ...
Perhaps you can consider us as: "techno-realists."2 This paper was written in the same spirit of Jonathan L. Zittrain's book The Future of Internet and how to stop it. ...
Acknowledgment These authors would like to express their sincere gratitude to editors of RIEECE 2018. ...
doi:10.6084/m9.figshare.7048649.v1
fatcat:n4fxm4mla5gnzcdc6zfdivqaeu
Partially Homomorphic Encryption Scheme for Real-Time Image Stream
2021
2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
However, by encrypting the stream of these IoT cameras, we have a chance to truly retain privacy and ownership of our data. ...
By only providing encrypted services to authenticate a user by login credentials, there still is a vulnerability in raw stream. ...
For others, this is simply a burden and a violation of rights since they want to protect their privacy in any way possible. ...
doi:10.1109/cscloud-edgecom52276.2021.00023
fatcat:4p3agxxgjnc6nmhcefskdzvnx4
Somatic Surveillance: Corporeal Control through Information Networks
2002
Surveillance & Society
The argument is that in present and projected forms, somatic surveillance systems abstract bodies and physiological systems from social contexts, facilitating hyper-individualized control and the commodification ...
Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices ...
allow for the easy portability of medical records from site to site; (3) it relies on Internet interfaces to access and manipulate patients' records, which are technically located in a central location ...
doi:10.24908/ss.v4i3.3446
fatcat:c2qju7nzpjhydbmcuwqk33xq5e
Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements
2014
Social Science Research Network
a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead ...
Koonin for sharing his slides from his stimulatingand, frankly, terrifyingtalk about CUSP at the Simons Foundation in March, 2013 which inspired this article, and also for providing additional information ...
(2) Sensors aimed at private property from public locations. ...
doi:10.2139/ssrn.2400736
fatcat:5hpcg2ush5a45emfwkgtodnini
Invisible computing: automatically using the many bits of data we create
2008
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
Even the devices themselves can keep track of their location and radio interactions, even without user involvement. The challenge of invisible computing is to make this wealth of data useful. ...
LABSCAPE automates the record keeping required of experimenters in a cell biology laboratory. The second example looks at more ad hoc interactions. ...
of authentication, security and privacy protection. ...
doi:10.1098/rsta.2008.0128
pmid:18672454
fatcat:sno2xop4uvb3bnlpusgs5eee3q
D2.4: Report on co-creation of services
2018
Zenodo
In this deliverable the user research and the different co-creation activities that were carried out in the hackAIR project in the first half of the project (M1-M18) are described. ...
Stephan is very happy to see that the sensors are wireless and he doesn't have to attach any power supply to it. He can just stick it somewhere and start measuring. ...
' or 'I have asthma'. End users only have access to the general air quality data and not to their own uploaded data. Sensor data from citizens. ...
doi:10.5281/zenodo.2273451
fatcat:m5ineq7pgfg2jldfoukpweqfme
Network Organization and Governance
[chapter]
2018
CRC Handbook of Modern Telecommunications
Design of Wireless Sensor Network Applications, Hardware and Software
Sajid Hussain A wireless sensor network (WSN) generally consists of a large number of sensor nodes, called motes, which could be ...
For sensor networks, the end user does not require all the data in the network because: (i) the data from neighboring nodes are highly correlated, making the data redundant, and (ii) the end user typically ...
point, and remote diagnostics cannot be analyzed end to end. ...
doi:10.1201/9781420078084-9
fatcat:eyixyd27nzbmthwoqybadgqz2e
Fog Assisted Cloud Models for Smart Grid Architectures- Comparison Study and Optimal Deployment
[article]
2018
arXiv
pre-print
Fog Computing (FC) extends the processing capabilities into the edge of the network, offering location-awareness, low latency, and latency-sensitive analytics for mission critical requirements of SG. ...
, and network cost. ...
Security Concerns: In the context of SG applications security is defined to mean the safety and stability of the power grid, rather than protection against malice, as the latter comes under the privacy ...
arXiv:1805.09254v1
fatcat:bnddfokhqbavvdqg36zec4j6jq
Net Neutrality and Mobile App Innovation in Denmark and Netherlands 2010–2016
2019
Review of Network Economics
The focus in on mobile networks because it allowed the most consistent data across countries. ...
Additionally, the explosion of mobile apps from countries with no net neutrality rules and the general dearth of mobile apps from countries which have had hard rules for years runs counter to expected ...
Section 222: Protecting Consumer Privacy. ...
doi:10.1515/rne-2019-0012
fatcat:fgldv7wx7fhn5h3eoe5yflzmta
« Previous
Showing results 1 — 15 out of 131 results