2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies 2014
DOI: 10.1109/icaccct.2014.7019214
|View full text |Cite
|
Sign up to set email alerts
|

Concealing of the base station's location for preserving privacy in Wireless Sensor Network by mitigating traffic patterns

Abstract: A Wireless Sensor Network (WSN) actually consists of a huge amount of small and tiny individual sensor nodes which are well capable of sensing and collecting data samples from the environment and are treated as the information source. These sensor nodes helps in monitoring physical or environmental conditions and also pass their data samples to the main location through the network. In wireless sensor networks the central point of failure is a base station which collects data from several intermediate nodes. B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Quite a few published studies, e.g. [15][22] [24][63]- [66], have used fake/deceptive packets as a means for disturbing the spatial correlation of packets and boosting the BS anonymity. Unlike these approaches, AD targets both spatial and temporal correlation of intercepted data packets by coordinating the times at which deceptive packets are transmitted.…”
Section: A Decepted Packets Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Quite a few published studies, e.g. [15][22] [24][63]- [66], have used fake/deceptive packets as a means for disturbing the spatial correlation of packets and boosting the BS anonymity. Unlike these approaches, AD targets both spatial and temporal correlation of intercepted data packets by coordinating the times at which deceptive packets are transmitted.…”
Section: A Decepted Packets Generationmentioning
confidence: 99%
“…For example, the designer may decide that any nodes with level less than should not participate in deceptive packet generation in order to avoid shortening their lifetime. Published studies like [22][64]- [66] have shown that injecting a high number of deceptive packets in areas with low traffic density would vary the traffic patterns and boost the anonymity of the BS. Similarly, AD allows fine tuning of the number of deceptive packets that a node in a certain level generates.…”
Section: ) Zoning and Rate Settingmentioning
confidence: 99%