2017
DOI: 10.1049/cje.2016.08.022
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…It is a significant standard for the global VM scheduling. When the next migration is going to be conducted, we should evaluate the idle-state of Get the running VM list in (5) Get the hosting task list in (6) for each hosted task do (7) Get the number of occupied VMs (8) Select the destination cloudlet by Algorithms 1 and 2 (9) end for (10) if all the VMs can be migrated away then (11) Generate a migration composition (12) Update the cloudlet status and VM distribution (13) else =1 (14) Delete the temporal migration strategies (15) end if (16) = + 1, = + 1 (17) end while (18) for the reserved tasks' records do the active cloudlets, to confirm and record the idle space before the migration time t. After detecting the idle space, the current cloudlet resource utilization before the migration time could be achieved.…”
Section: Idle-state Detection For Cloudletsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is a significant standard for the global VM scheduling. When the next migration is going to be conducted, we should evaluate the idle-state of Get the running VM list in (5) Get the hosting task list in (6) for each hosted task do (7) Get the number of occupied VMs (8) Select the destination cloudlet by Algorithms 1 and 2 (9) end for (10) if all the VMs can be migrated away then (11) Generate a migration composition (12) Update the cloudlet status and VM distribution (13) else =1 (14) Delete the temporal migration strategies (15) end if (16) = + 1, = + 1 (17) end while (18) for the reserved tasks' records do the active cloudlets, to confirm and record the idle space before the migration time t. After detecting the idle space, the current cloudlet resource utilization before the migration time could be achieved.…”
Section: Idle-state Detection For Cloudletsmentioning
confidence: 99%
“…Especially in an open network such as WMAN, personal information is easily leaked with high probability. The more nodes data pass through in WMAN when the data about users' privacy is transmitted, the more possibly users' privacy could be leaked [15]. To realize privacy preservation of mobile users, it is necessary to reduce the data transmission hops due to VM migrations [16].…”
Section: Introductionmentioning
confidence: 99%
“…But this could create many new threats (e.g., Refs. [2,3]). In this work, we are especially interested in a physical-layer authentication, where the authentication information is embedded into the modulated signal and transmitted over a noisy channel.…”
Section: Introductionmentioning
confidence: 99%
“…Anytime, any sensor node may become a SoN. Once the target is detected, the SoN will generate the encrypted data packets and transmit them to the SN in a multi hop fashion [2,3]. However, due to the open nature of the wireless transmission medium, the packet sender can easily be located by the adversary.…”
Section: Introductionmentioning
confidence: 99%
“…They use the phantom node to entice the adversaries away from the actual source node. If the attacker cannot track the PN, it is impossible for him to trace the location of the true source node [2]. PRS involves two phases: The random walk phase and the subsequent flooding phase.…”
Section: Introductionmentioning
confidence: 99%