In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jangseong KIM, Taeshik SHON, Kwangjo KIM, "Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment" in IEICE TRANSACTIONS on Communications,
vol. E94-B, no. 3, pp. 686-689, March 2011, doi: 10.1587/transcom.E94.B.686.
Abstract: In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E94.B.686/_p
Copy
@ARTICLE{e94-b_3_686,
author={Jangseong KIM, Taeshik SHON, Kwangjo KIM, },
journal={IEICE TRANSACTIONS on Communications},
title={Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment},
year={2011},
volume={E94-B},
number={3},
pages={686-689},
abstract={In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.},
keywords={},
doi={10.1587/transcom.E94.B.686},
ISSN={1745-1345},
month={March},}
Copy
TY - JOUR
TI - Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment
T2 - IEICE TRANSACTIONS on Communications
SP - 686
EP - 689
AU - Jangseong KIM
AU - Taeshik SHON
AU - Kwangjo KIM
PY - 2011
DO - 10.1587/transcom.E94.B.686
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E94-B
IS - 3
JA - IEICE TRANSACTIONS on Communications
Y1 - March 2011
AB - In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.
ER -