Biblio

Export results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is U  [Clear All Filters]
R. Rios, and J. Lopez, "(Un)Suitability of Anonymous Communication Systems to WSN",
IEEE Systems Journal, vol. 7, no. 2, IEEE Systems Council, pp. 298 - 310, Jun 2013. DOI (I.F.: 1.746)More..

Abstract

Anonymous communication systems have been extensively studied by the research community to prevent the disclosure of sensitive information from the analysis of individuals’ traffic patterns. Many remarkable solutions have been developed in this area, most of which have proven to be effective in the protection of user privacy against different types of attacks. Recently, the privacy preservation problem has also been considered in the realm of wireless sensor networks (WSNs) due to their imminent adoption in real-world scenarios. A special challenge that arises from the analysis of the flow of sensor nodes’ communications is the location privacy problem. In this work we concentrate on analyzing the suitability of traditional anonymous communication systems originally designed for the Internet to the original scenario of sensor networks. The results show that, in most cases, traditional solutions do not provide the adequate protection means for the particular problem of location privacy, while other solutions are too resource-consuming for the restricted capabilities of sensor nodes.

Impact Factor: 1.746
Journal Citation Reports® Science Edition (Thomson Reuters, 2013)

PDF icon Rios2012a.pdf (488.58 KB)
P. Najera, R. Roman, and J. Lopez, "User-centric secure integration of personal RFID tags and sensor networks",
Security and Communication Networks, vol. 6, Wiley-Blackwell, pp. 1177–1197, Oct 2013. DOI (I.F.: 0.433)More..

Abstract

A personal network (PN) should enable the collaboration of user’s devices and services in a flexible, self-organizing and friendly manner. For such purpose, the PN must securely accommodate heterogeneous technologies with uneven computational and communication resources. In particular, personal RFID tags can enable seamless recognition of user’s context, provide user authentication and enable novel services enhancing the quality and quantity of data handled by the PN. However, the highly constrained features of common RFID tags and their passive role in the network highlights the need of an adequate secure communication model with personal tags which enables their participation as a member of the PN. In this paper, we present our concept of PN, with special emphasis on the role of RFID and sensor networks, and define a secure architecture for PNs including methods for the secure access to context-aware technologies from both local PN members and the Internet of Things. The PN architecture is designed to support differentiated security mechanisms to maximize the level of security for each type of personal device. Furthermore, we analyze which security solutions available in the literature can be adapted for our architecture, as well as the challenges and security mechanisms still necessary in the secure integration of personal tags.

Impact Factor: 0.433
Journal Citation Reports® Science Edition (Thomson Reuters, 2013)

Modify or remove your filters and try again.