2010
DOI: 10.3390/s100301447
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Network Level Privacy in Wireless Sensor Networks

Abstract: Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(28 citation statements)
references
References 32 publications
(54 reference statements)
0
28
0
Order By: Relevance
“…However, works such as in [3,6,13,19,20] do not use dummy messages. In particular, [17] and [9] proposed a two-phase solution called phantom routing scheme (PRS).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, works such as in [3,6,13,19,20] do not use dummy messages. In particular, [17] and [9] proposed a two-phase solution called phantom routing scheme (PRS).…”
Section: Related Workmentioning
confidence: 99%
“…PRS has received a lot of attention in the literature. On the other hand, the weaknesses as proposed by [22], [19] and [11] for poor SLP are due to the directed random walk reusing the routing path and exposure of direction information. In order to improve the random walk quality, [23] proposed using location angles to construct the random walk.…”
Section: Related Workmentioning
confidence: 99%
“…A variety of approaches that do not rely on the use of dummy messages have also been proposed to address the SLP problem [4,14,15,16,17]. In particular, Ozturk et al [8] and Kamat et al [3] proposed a two-phase solution.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, this scheme has low communication overhead. Shaikh et al (2010) have proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses the privacy problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy.…”
Section: Key Management In Wireless Sensor Networkmentioning
confidence: 99%
“…The queries are processed in order to give the required answer to the legitimate entity. Hence the propagation of a fake query is limited (Shaikh et al, 2010) …”
Section: Authentication and Its Issuesmentioning
confidence: 99%