Proceedings of the Symposium on Applied Computing 2017
DOI: 10.1145/3019612.3019655
|View full text |Cite
|
Sign up to set email alerts
|

Deconstructing source location privacy-aware routing protocols

Abstract: Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol.In this paper, we focus on deconstructing routing-based S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 24 publications
(31 reference statements)
0
7
0
Order By: Relevance
“…We choose these two because they adopt different techniques to provide SLP, ie, fake sources and message delay, respectively. Those two routing protocols are also instances of two classes of SLP protocols, ie, spatially‐aware protocol and temporal‐aware protocol, respectively …”
Section: Resultsmentioning
confidence: 99%
“…We choose these two because they adopt different techniques to provide SLP, ie, fake sources and message delay, respectively. Those two routing protocols are also instances of two classes of SLP protocols, ie, spatially‐aware protocol and temporal‐aware protocol, respectively …”
Section: Resultsmentioning
confidence: 99%
“…An issue with SLP routing protocol is that they require an element of redundancy [35] in order to provide SLP. Therefore, we now show that proper completing paths cannot always exist and under what circumstances a proper competing path needs to exist for an SLP routing protocol to exist.…”
Section: Existence Of Proper Competing Pathsmentioning
confidence: 99%
“…There are two main classes of SLP-aware routing protocols: spatial and temporal [23]. The objective of a spatial SLP-aware routing protocol is to ensure that the attacker takes a path which is longer than the shortest path to reach the asset.…”
Section: Problem Statement Formalisationmentioning
confidence: 99%
“…We proposed two rules, based on message transmissions, for the transformation. We conjecture that the transformation process can be applied to other spatial SLP protocols [23] modelled as schedules, as shown in Figures 20 and 21, where two different variants of DynamicSPR were considered. As such, once the non-duty cycled SLP protocol has been modelled as a schedule, then similar transformation rules can be applied, with the difference being in the size of the windows.…”
Section: Applicability To Other Techniquesmentioning
confidence: 99%
See 1 more Smart Citation