Cargando…
Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the sou...
Autores principales: | Bushnag, Anas, Abuzneid, Abdelshakour, Mahmood, Ausif |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4970011/ https://www.ncbi.nlm.nih.gov/pubmed/27355948 http://dx.doi.org/10.3390/s16070957 |
Ejemplares similares
-
Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
por: Abuzneid, Abdel-Shakour, et al.
Publicado: (2015) -
Survey on Prominent RFID Authentication Protocols for Passive Tags
por: Baashirah, Rania, et al.
Publicado: (2018) -
Comparison and Feasibility of Various RFID Authentication Methods Using ECC
por: Alexander, Pagán, et al.
Publicado: (2018) -
Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise
por: Nang Paing, Saw, et al.
Publicado: (2022) -
Distributed Reliable and Efficient Transmission Task Assignment for WSNs
por: Zhu, Xiaojuan, et al.
Publicado: (2019)