{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T23:51:10Z","timestamp":1655769070019},"reference-count":17,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,5,1]]},"abstract":"<jats:p> With regard to the spread of innovative technologies, wireless sensor networks (WSNs) have great research interest in recent years. Although the WSN service is being facilitated, security related accidents are continuously incurring. In particular, many activities between mobile devices and sensor nodes take place without too much of protection of privacy information. To avoid these risks in WSN, we do need to devise the privacy care architecture to prevent the private data loss or breach especially in WSN. In this paper, we focus on WSN privacy issues with respect to mobile environments. We also suggest architecture to securely manage private data collected by WSN. It helps to protect the collected private data more efficiently and prevent the private data loss and breach. <\/jats:p>","DOI":"10.1155\/2013\/369502","type":"journal-article","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T21:01:19Z","timestamp":1369861279000},"page":"369502","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Care Architecture in Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Kyong-Jin","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sungshin Women's University, Seongbuk-gu, Seoul 136-742, Republic of Korea"}]},{"given":"Seng-Phil","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Information Technology, Sungshin Women's University, Seongbuk-gu, Seoul 136-742, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,5,29]]},"reference":[{"key":"B1-2013-369502","volume-title":"Wireless Sensor Networks 2012\u20132022","author":"Harrop P.","year":"2012"},{"key":"B15-2013-369502","doi-asserted-by":"publisher","DOI":"10.5772\/14272"},{"key":"B20-2013-369502","first-page":"41","volume":"50","author":"Barbin J. P.","year":"2013","journal-title":"International Journal of Advanced Science and Technology"},{"key":"B19-2013-369502","first-page":"83","volume":"30","author":"Singh S. K.","year":"2011","journal-title":"International Journal of Advanced Science and Technology"},{"key":"B2-2013-369502","author":"Harrop P.","journal-title":"Energy Harvesting Journal"},{"key":"B5-2013-369502","first-page":"133","volume":"48","author":"Park B.","year":"2012","journal-title":"International Journal of Advanced Science and Technology"},{"key":"B6-2013-369502","doi-asserted-by":"publisher","DOI":"10.3390\/s90906869"},{"issue":"1","key":"B13-2013-369502","volume":"13","author":"Yoon J.","year":"2011","journal-title":"Informedia Law"},{"issue":"3","key":"B14-2013-369502","first-page":"276","volume":"39","author":"Cha G.","year":"2012","journal-title":"Journal of KISS"},{"key":"B8-2013-369502","doi-asserted-by":"crossref","DOI":"10.1186\/1687-1499-2012-48","volume":"2012","author":"Araujo A.","year":"2012","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"B17-2013-369502","doi-asserted-by":"publisher","DOI":"10.24846\/v22i2y101307"},{"key":"B9-2013-369502","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"B7-2013-369502","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2008.4712577"},{"key":"B10-2013-369502","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/492819"},{"key":"B11-2013-369502","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"B18-2013-369502","doi-asserted-by":"publisher","DOI":"10.24846\/v22i2y101304"},{"key":"B16-2013-369502","volume-title":"Cloud Computing: Implementation, Management, and Security","author":"Ransome J. F.","year":"2010"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/369502","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/369502","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/369502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:25:55Z","timestamp":1621203955000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/369502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5,1]]}},"alternative-id":["10.1155\/2013\/369502"],"URL":"https:\/\/doi.org\/10.1155\/2013\/369502","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}