2015
DOI: 10.1155/2015/697098
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Communication Protocol for Location Privacy in WSN

Abstract: Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Network Coverage: Network coverage is an essential topic for all scenarios of the WSN. Many SLP related techniques are compromised with network coverage in the WSN [90]. To make a trade-off between SLP and network coverage is an important area where researchers need to give some more attention.…”
Section: Mobilitymentioning
confidence: 99%
“…Network Coverage: Network coverage is an essential topic for all scenarios of the WSN. Many SLP related techniques are compromised with network coverage in the WSN [90]. To make a trade-off between SLP and network coverage is an important area where researchers need to give some more attention.…”
Section: Mobilitymentioning
confidence: 99%
“…Attackers are mainly focusing on the sink node, source node and traffic patterns of the network because of their importance in the network. Abdel et al [15] proposed a model with fake message injection that can preserve Source location privacy, sink node location privacy and data security against active and passive attacks from local, multi-local and global adversaries.…”
Section: Introductionmentioning
confidence: 99%