2020
DOI: 10.1109/access.2020.2989434
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques

Abstract: In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries. Similarly, in safety-critical monitoring applications, the WSNs are expected to guarantee effective source location privacy (SLP) protection throughout the network lifetime. Fake packet-based SLP protocols are often energy-inefficient, they incur short network lifetime, and have high probability of pac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(23 citation statements)
references
References 40 publications
0
23
0
Order By: Relevance
“…This study is motivated by the discussions in [2], [4], [19], [21]- [23], [30]. In [30], it was shown that the DissR and DistrR protocols achieve short-term SLP protection and reduced network lifetime due to high energy consumption. Furthermore, it was shown that DissR incurs unbalanced energy distribution.…”
Section: A Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…This study is motivated by the discussions in [2], [4], [19], [21]- [23], [30]. In [30], it was shown that the DissR and DistrR protocols achieve short-term SLP protection and reduced network lifetime due to high energy consumption. Furthermore, it was shown that DissR incurs unbalanced energy distribution.…”
Section: A Motivationmentioning
confidence: 99%
“…Numerous SLP protocols have been proposed. Many of the protocols were discussed in [11], [12], [16], [30]- [36], [42]. Some of the recently proposed SLP protocols include the two-level phantom with a pursue ring protocol [12], unified single and multi-path routing protocol [13], dynamic multipath routing protocol [17], grid-based single phantom node protocol [34], data dissemination protocol [37], and the protocol based on anonymity cloud [43].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In RPFs, each node must acquire and store less network topology information to ensure that the network is operating, which reduces the storage space for sensor nodes and further strengthens the security of WSNs. In PRFs, data packets transmitted in the network are primarily divided into two categories: real and fake packets [13]. The real packets contain data collected by the source node, while the fake packets are used to imitate the behavior of real packets to confuse attackers.…”
Section: Introductionmentioning
confidence: 99%