ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 文献種別
  2. 会議発表論文/Conference Paper
  1. 研究者
  2. 情報アーキテクチャ学科
  3. 中村 嘉隆 (Nakamura, Yoshitaka)

Certification of Secure Encounter History Among Low Power Mobile Sensors

http://hdl.handle.net/10445/6477
http://hdl.handle.net/10445/6477
240958bc-c2d4-47a4-b7be-9ef7731d8637
Item type 会議発表論文 / Conference Paper(1)
公開日 2011-09-02
タイトル
タイトル Certification of Secure Encounter History Among Low Power Mobile Sensors
言語
言語 eng
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
アクセス権
アクセス権 metadata only access
アクセス権URI http://purl.org/coar/access_right/c_14cb
著者 Sakai, Takurou

× Sakai, Takurou

WEKO 3270

Sakai, Takurou

Search repository
Uchiyama, Akira

× Uchiyama, Akira

WEKO 3271

Uchiyama, Akira

Search repository
中村, 嘉隆

× 中村, 嘉隆

WEKO 85
e-Rad 40452528
ORCIDID 0000-0001-8248-064X

ja 中村, 嘉隆
ISNI


Search repository
Higashino, Teruo

× Higashino, Teruo

WEKO 3272

Higashino, Teruo

Search repository
抄録
内容記述タイプ Abstract
内容記述 In this paper, we propose a technique for certifying encounter information
with acquaintances in wireless sensor networks. In our technique, we assume that
each user holds a small low power sensor with a short range wireless communication
device such as ZigBee, and that multiple sensors called landmarks, which provide
accurate location and time, are sparsely distributed in the target area. Each user’s
sensor stores encounter information obtained from other users and landmarks in its
memory, and it sends those information to its local server when it meets with landmarks
which are connected to the Internet. At the same time, we assume that each
user registers his/her private key and the list (called friend list) of his/her acquaintances
in the Certification Authority (CA) server. When each user sends his/her encounter
information to CA, CA informs the digital evidence about when and whom
each user has met. In order to keep privacy of each encountered person, if an encountered
person does not register the user’s name in his/her friend list, the user
cannot know that the user has met with the encountered person. Thus, our technique
guarantees anonymity and unlinkability of encounter information by using a hash
function and symmetric-key encryption. We have implemented the proposed technique
using a hash function SHA-1 on MOTE and confirmed efficiency of the proposed
technique through experiments. In addition, we have theoretically analyzed
its low energy consumption and practical ability about traceability.
書誌情報 4th Annual IFIP WG 11.9 International Conference on Digital Forensics (ICDF2008)

p. 95-110, 発行日 2008-01
査読有無
値 あり/yes
研究業績種別
値 国際会議/International Conference
単著共著
値 共著/joint
戻る
0
views
See details
Views

Versions

Ver.1 2023-06-20 14:06:11.704642
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3