{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:04:27Z","timestamp":1758845067888},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540352273"},{"type":"electronic","value":"9783540352280"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11776178_13","type":"book-chapter","created":{"date-parts":[[2006,6,10]],"date-time":"2006-06-10T15:46:30Z","timestamp":1149954390000},"page":"202-217","source":"Crossref","is-referenced-by-count":28,"title":["Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"William","family":"Conner","sequence":"first","affiliation":[]},{"given":"Tarek","family":"Abdelzaher","sequence":"additional","affiliation":[]},{"given":"Klara","family":"Nahrstedt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., Culler, D.: An analysis of a large scale habitat monitoring application. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031521"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based countersniper system. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031497"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Aslam, J., Butler, Z., Constantin, F., Crespi, V., Cybenko, G., Rus, D.: Tracking a moving object with a binary sensor network. In: 1st ACM Conference on Embedded Networked Sensor Systems (2003)","DOI":"10.1145\/958491.958509"},{"key":"13_CR4","unstructured":"Hwang, I., Balakrishnan, H., Roy, K., Shin, J., Guibas, L., Tomlin, C.: Multiple-target tracking and identity management. In: 2nd IEEE International Conference on Sensors (2003)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Gu, L., Jia, D., Vicaire, P., Yan, T., Luo, L., Tirumala, A., Cao, Q., He, T., Stankovic, J., Abdelzaher, T., Krogh, B.: Lightweight detection and classification for wireless sensor networks in realistic environments. In: 3rd ACM Conference on Embedded Networked Sensor Systems (2005)","DOI":"10.1145\/1098918.1098941"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Abdelzaher, T., Blum, B., Cao, Q., Chen, Y., Evans, D., George, J., George, S., Gu, L., He, T., Krishnamurthy, S., Luo, L., Son, S., Stankovic, J., Stoleru, R., Wood, A.: EnviroTrack: towards an environmental computing paradigm for distributed sensor networks. In: 24th International Conference on Distributed Computing Systems (2004)","DOI":"10.1109\/ICDCS.2004.1281625"},{"key":"13_CR7","unstructured":"Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.-S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with Zebranet. In: 2nd International Conference on Mobile Systems, Applications, and Services (2004)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: The International Conference on Dependable Systems and Networks (2004)","DOI":"10.1109\/DSN.2004.1311934"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. In: 7th International Conference on Mobile Computing and Networking (2001)","DOI":"10.1145\/381677.381696"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)","DOI":"10.1145\/1029102.1029113"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Chang Shantz, S.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. In: 3rd IEEE International Conference on Pervasive Computing and Communications (2005)","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications (1998)","DOI":"10.1109\/49.668972"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: a distributed anonymous information storage and retrieval system. In: International Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"13_CR15","unstructured":"Fu, X., Graham, B., Bettati, R., Zhao, W.: On effectiveness of link padding for statistical traffic analysis attacks. In: 23rd International Conference on Distributed Computing Systems (2003)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: 1st IEEE\/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)","DOI":"10.1145\/1029102.1029117"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: 5th Symposium on Operating Systems Design and Implementation (2002)","DOI":"10.1145\/1060289.1060303"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems\u00a030(1) (2005)","DOI":"10.1145\/1061318.1061322"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: 9th International Conference on Mobile Computing and Networking (2003)","DOI":"10.1145\/938985.938995"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Chan, H., Luk, M., Perrig, A.: Using clustering information for sensor network localization. In: International Conference on Distributed Computing in Sensor Systems (2005)","DOI":"10.1007\/11502593_11"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Moore, D., Leonard, J., Rus, D., Teller, S.: Robust distributed network localization with noisy range measurements. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031502"},{"key":"13_CR23","unstructured":"Kim, S., Fonseca, R., Culler, D.: Reliable transfer on wireless sensor networks. In: 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (2004)"},{"key":"13_CR24","unstructured":"Institute for Software Integrated Systems at Vanderbilt University. JProwler, http:\/\/www.isis.vanderbilt.edu\/projects\/nest\/jprowler\/"},{"key":"13_CR25","unstructured":"Crossbow. MICA2 Datasheet, http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICA2_Datasheet.pdf"},{"key":"13_CR26","unstructured":"Crossbow. MICAz Datasheet, http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Maroti, M., Kusy, B., Simon, G., Ledeczi, A.: The flooding time synchronization protocol. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031501"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing in Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11776178_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:15:16Z","timestamp":1619507716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11776178_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540352273","9783540352280"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11776178_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}