Proceedings of the 30th Annual ACM Symposium on Applied Computing 2015
DOI: 10.1145/2695664.2695843
|View full text |Cite
|
Sign up to set email alerts
|

A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs

Abstract: Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed in this paper. The proposed protocol is composed of two critical phases: 1) adjusting the value of minimum-hops between a phantom node and its source, and varying the area of the phantom node distribution region at the network deployment stage; 2) generating a set of Gaussian-distributed random real numbers using the Pseudo Random Gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Examples of routing protocols which adopt phantom routing include the trace cost based source location privacy protection scheme [9], phantom walkabouts routing protocol [13], the phantom routing with locational angle [22], and the energy efficient privacy preserved routing algorithm [23]. Similarly, the phantom routing strategy is adopted in the multiple-phantom nodes routing scheme [24], the grid-based single phantom node and grid-based dual phantom node source location privacy protection schemes [25], the self-adjusting directed random walk approach [26], and the pseudo normal distribution-based phantom routing protocol [27]. The baseline phantom routing protocol offers low levels of SLP protection because it employs short and predictable routing paths.…”
Section: Related Workmentioning
confidence: 99%
“…Examples of routing protocols which adopt phantom routing include the trace cost based source location privacy protection scheme [9], phantom walkabouts routing protocol [13], the phantom routing with locational angle [22], and the energy efficient privacy preserved routing algorithm [23]. Similarly, the phantom routing strategy is adopted in the multiple-phantom nodes routing scheme [24], the grid-based single phantom node and grid-based dual phantom node source location privacy protection schemes [25], the self-adjusting directed random walk approach [26], and the pseudo normal distribution-based phantom routing protocol [27]. The baseline phantom routing protocol offers low levels of SLP protection because it employs short and predictable routing paths.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [21] propose a novel routing strategy to protect the SLP, which consists of directional random routing, h-hop routing in the annular region and the shortest path routing. In the Reference [16], the authors propose a SLP protection strategy via pseudo normal distribution-based phantom routing. Zhou et al [22] protect the SLP by utilizing the sensor ability of perceiving the presence of a mobile attacker nearby.…”
Section: Related Workmentioning
confidence: 99%
“…The existing source location privacy (SLP) protection methods [13][14][15][16][17][18] mainly protect the SLP by increasing the variety of routing paths, such as phantom routing, multi-path routing, and false information source injection and other secure routing mechanisms. Most of these technologies sacrifice network performance for a certain level of security and are not suitable for applications that require high query efficiency.…”
Section: Introductionmentioning
confidence: 99%