ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Privacy In Wireless Sensor Networks Using Ring Signature

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Debnath, Ashmita (Author)
مؤلفين آخرين: Singaravelu, Pradheepkumar (Co-Author) , Verma, Shekhar (Co-Author)
المجلد/العدد: مج26, ع2
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2014
الصفحات: 228 - 236
DOI: 10.33948/0584-026-002-006
ISSN: 1319-1578
رقم MD: 973102
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Privacy | Security | Wireless Sensor Network | Ring Signature | Authentication
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02368nam a22002537a 4500
001 1716009
024 |3 10.33948/0584-026-002-006 
041 |a eng 
044 |b السعودية 
100 |9 524659  |a Debnath, Ashmita  |e Author 
245 |a Privacy In Wireless Sensor Networks Using Ring Signature 
260 |b جامعة الملك سعود  |c 2014 
300 |a 228 - 236 
336 |a بحوث ومقالات  |b Article 
520 |b  The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network. 
653 |a تكنولوجيا المعلومات  |a الاستشعار عن بعد  |a حركة المرور 
692 |b Privacy  |b Security  |b Wireless Sensor Network  |b Ring Signature  |b Authentication 
700 |9 524660  |a Singaravelu, Pradheepkumar  |e Co-Author 
700 |9 524661  |a Verma, Shekhar  |e Co-Author 
773 |c 006  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 002  |m مج26, ع2  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 026  |x 1319-1578 
856 |u 0584-026-002-006.pdf 
930 |d y  |p y 
995 |a science 
999 |c 973102  |d 973102 

عناصر مشابهة