2017
DOI: 10.3390/s17030614
|View full text |Cite
|
Sign up to set email alerts
|

All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks

Abstract: Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information from the original wireless sensor networks. Recently, contextual privacy issues associated with wireless communication in open spaces have not been thoroughly addressed and one of the most important challenges is protecting the source locations of the valuable packa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…To save energy, only the changed reputations are delivered and the sink node uses historical data for the nodes with unchanged reputations. Then the suspicious nodes can be detected by a reputation threshold and they can be divided into clusters by proper clustering algorithms (e.g., k-means and DBSCAN) [26]- [28] based on their locations. In this paper, the similarities between the suspicious nodes are defined as the Euclidean distance.…”
Section: A Construction Of the Crsmentioning
confidence: 99%
“…To save energy, only the changed reputations are delivered and the sink node uses historical data for the nodes with unchanged reputations. Then the suspicious nodes can be detected by a reputation threshold and they can be divided into clusters by proper clustering algorithms (e.g., k-means and DBSCAN) [26]- [28] based on their locations. In this paper, the similarities between the suspicious nodes are defined as the Euclidean distance.…”
Section: A Construction Of the Crsmentioning
confidence: 99%
“…The source node starts sending event packets periodically to the sink node based on a multi-hop routing communication scheme. The network employs the k-nearest neighbor tracking approach [9] to track the asset. Nodes may follow a sleeping schedule, and are kept silent when no asset is detected.…”
Section: Modelsmentioning
confidence: 99%
“…Tree-based diversionary routing scheme was included in the analysis because it is one of the more recent proposed schemes which provide very high source location privacy. The random walk of the phantom single-path routing scheme was set to 20% of the hops between the source and the sink nodes [9]. The network simulation parameters are summarized in Table 1.…”
Section: Performance Analysis and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…At the border of the cloud, the fake source nodes send the shares to the sink node independently. To hinder the adversary locating the cloud easily, we integrate the All-direction Random Routing algorithm (ARR) [21] into our scheme. In the ARR scheme, the relay node is defined as the nearest node to the virtual location that is randomly selected by the source node.…”
Section: Secure Data Sharing Between the Source Node And Sink Nodementioning
confidence: 99%