1.

Record Nr.

UNINA9910833598903321

Autore

Trotta, Donatella

Titolo

Modernità e storicità di Graziadio Isaia Ascoli / Donatella Trotta

Pubbl/distr/stampa

Gorizia, 1986

Descrizione fisica

P. 83-107 ; 24 cm

Locazione

FLFBC

Collocazione

DAM OPUSC. 05 (04)

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Estr. dal v. 63 di Studi Goriziani

2.

Record Nr.

UNINA9910149365003321

Autore

Rios Ruben <1983, >

Titolo

Location privacy in wireless sensor networks / / Ruben Rios, Javier Lopez, and Jorge Cuellar

Pubbl/distr/stampa

Boca Raton : , : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, , [2017]

©2017

ISBN

1-315-36693-2

1-315-34982-5

1-4987-7634-5

Edizione

[1st ed.]

Descrizione fisica

1 online resource (194 pages) : illustrations

Collana

Series in Security, Privacy, and Trust

Disciplina

621.3841/92

Soggetti

Location-based services - Security measures

Internet of things - Security measures

Wireless sensor networks - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

1. Introduction -- 2. Suitability of computer-based anonymity systems -- 3. Analysis of location privacy solutions in WSNs -- 4. Context-aware source-location privacy -- 5. Probabilistic reciever-location privacy -- 6. Conclusion.

Sommario/riassunto

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.