2017
DOI: 10.1109/access.2017.2752179
|View full text |Cite
|
Sign up to set email alerts
|

Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…To minimize the communication cost while achieving high levels of adversary obfuscation, the DDR, TDR, PRR, and FPR protocols can integrate node offset angle routing strategies in their routing algorithms. The effectiveness of the node offset angle routing algorithms was demonstrated in [4], [34], and [36]. To improve the privacy performance of the PRR protocol, the real packet routes and fake packet routes must be homogenous.…”
Section: Discussionmentioning
confidence: 99%
“…To minimize the communication cost while achieving high levels of adversary obfuscation, the DDR, TDR, PRR, and FPR protocols can integrate node offset angle routing strategies in their routing algorithms. The effectiveness of the node offset angle routing algorithms was demonstrated in [4], [34], and [36]. To improve the privacy performance of the PRR protocol, the real packet routes and fake packet routes must be homogenous.…”
Section: Discussionmentioning
confidence: 99%
“…The scheme achieved low energy consumption, but the scheme can be applied to WSN with only one sink. Chen et al 51 presented the constrained routing mechanism for the WSN. The scheme concentrated on the privacy issues, and has neglected the importance of the energy balancing.…”
Section: Literature Surveymentioning
confidence: 99%
“…The candidate set changes at every packet forwarding instance to form multiple paths towards the sink node for high privacy level. Other angle-based routing schemes include two-phantom angle-based routing [14] and constrained random routing [15]. Two-phantom angle-based routing scheme considers a triplet for selecting the phantom nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The energy consumption of the proposed scheme can be improved by a more strategic distribution of mediate and diversion nodes in the network. Also, the angle-based routing technique used in [15] can be applied to reduce the energy consumption of the proposed scheme. In [15], rectangular coordinate technique is used in the process of next-hop selection to minimize the lengths of routing paths and nodes with smaller offset angles are given higher priority to be selected as next-hop nodes.…”
Section: Performance Analysis and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation