TY - GEN
T1 - Providing anonymity in wireless sensor networks
AU - Ouyang, Yi
AU - Le, Zhengyi
AU - Xu, Yurong
AU - Triandopoulos, Nikes
AU - Zhang, Sheng
AU - Ford, James
AU - Makedon, Fillia
PY - 2007
Y1 - 2007
N2 - Sensor networks are often used to monitor sensitive information from the environment or track sensitive objects' movements. Anonymity has become an important problem in sensor networks, and has been widely researched in wireless ad hoc and wired networks. The limited capacity and resources of current sensor networks have brought new challenges to anonymity research. In this paper, two efficient methods are proposed based on using a one-way hash chain to dynamically change the identity of sensor nodes in order to provide anonymity, and their anonymity properties are analyzed and compared.
AB - Sensor networks are often used to monitor sensitive information from the environment or track sensitive objects' movements. Anonymity has become an important problem in sensor networks, and has been widely researched in wireless ad hoc and wired networks. The limited capacity and resources of current sensor networks have brought new challenges to anonymity research. In this paper, two efficient methods are proposed based on using a one-way hash chain to dynamically change the identity of sensor nodes in order to provide anonymity, and their anonymity properties are analyzed and compared.
UR - http://www.scopus.com/inward/record.url?scp=52249090009&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=52249090009&partnerID=8YFLogxK
U2 - 10.1109/PERSER.2007.4283904
DO - 10.1109/PERSER.2007.4283904
M3 - Conference contribution
AN - SCOPUS:52249090009
SN - 1424413265
SN - 9781424413263
T3 - 2007 IEEE International Conference on Pervasive Services, ICPS
SP - 145
EP - 148
BT - 2007 IEEE International Conference on Pervasive Services, ICPS
T2 - 2007 IEEE International Conference on Pervasive Services, ICPS
Y2 - 15 July 2007 through 20 July 2007
ER -