{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:04:26Z","timestamp":1758845066206},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_3","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"20-28","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Event Handoff Unobservability in WSN"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ortolani","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), pp. 51\u201355 (2008)","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N. Li","year":"2009","unstructured":"Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks\u00a07, 1501\u20131514 (2009)","journal-title":"Ad Hoc Networks"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 2045\u20132053 (2007)","DOI":"10.1109\/INFCOM.2007.237"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/sec.95","volume":"2","author":"M. Conti","year":"2009","unstructured":"Conti, M., Zhang, L., Roy, S., Di Pietro, R., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks\u00a02, 195\u2013213 (2009)","journal-title":"Security and Communication Networks"},{"key":"3_CR5","unstructured":"Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), pp. 77\u201388 (2006)"},{"key":"3_CR6","unstructured":"Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599\u2013608 (2005)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88\u201393 (2004)","DOI":"10.1145\/1029102.1029117"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/11776178_13","volume-title":"Distributed Computing in Sensor Systems","author":"W. Conner","year":"2006","unstructured":"Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol.\u00a04026, p. 202. Springer, Heidelberg (2006)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955\u20131963 (2007)","DOI":"10.1109\/INFCOM.2007.227"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), pp. 314\u2013323 (2007)","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec 2008), pp. 77\u201388 (2008)","DOI":"10.1145\/1352533.1352547"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Ouyang, Y., Le, Z., Liu, D., Ford, J., Makedon, F.: Source location privacy against laptop-class attacks in sensor networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), pp. 1\u201310 (2008)","DOI":"10.1145\/1460877.1460884"},{"key":"3_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-05284-2_22","volume-title":"Security and Privacy in Communication Networks","author":"Y. Yang","year":"2009","unstructured":"Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source location privacy: Analysis and countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.\u00a019, pp. 373\u2013393. Springer, Heidelberg (2009)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing anonymity in wireless sensor networks. In: IEEE International Conference on Pervasive Services, pp. 145\u2013148 (2007)","DOI":"10.1109\/PERSER.2007.4283904"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-40956-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 184\u2013188. Springer, Heidelberg (2003)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems\u00a010, 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge Based Systems"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 122\u2013130 (2003)","DOI":"10.1145\/948109.948128"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TMC.2006.16","volume":"5","author":"N. Potlapally","year":"2006","unstructured":"Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing\u00a05, 128\u2013143 (2006)","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:05:51Z","timestamp":1584403551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}