2021
DOI: 10.1155/2021/6654427
|View full text |Cite
|
Sign up to set email alerts
|

Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT

Abstract: Source location privacy, one of the core contents of Wireless Sensor Network (WSN) security, has a significant impact on extensive application of WSNs. In this paper, a novel location privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) is proposed by using multibranch and fake sources. This scheme has three phases. In the first place, the data of the source are randomly sent to a certain intermediate node. Then, a minimum hop routing (MHR) from the intermediate node to the base station … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 30 publications
(38 reference statements)
0
6
0
Order By: Relevance
“…Their model able to defend the smart adversary also means the adversary who has access to both the global and local view of the network. To address the issue of energy consumption in WSN, authors [52]proposed Energy Balanced Branch Tree (EBBT) in SLP. Their model uses fake sources and works in three phases:…”
Section: Fig 12 the Working Model Of Path Extension Methodsmentioning
confidence: 99%
“…Their model able to defend the smart adversary also means the adversary who has access to both the global and local view of the network. To address the issue of energy consumption in WSN, authors [52]proposed Energy Balanced Branch Tree (EBBT) in SLP. Their model uses fake sources and works in three phases:…”
Section: Fig 12 the Working Model Of Path Extension Methodsmentioning
confidence: 99%
“…Researchers have put forth a variety of routing strategies to address the WSN privacy issue with source nodes. In [ 15 , 19 , 22 , 25 , 26 , 27 , 35 , 36 ], fake packet-based SLP techniques were put out. Since we realized that for energy-constrained WSNs, such schemes (fake packet/fake sources-based SLP) would be energy-expensive, we do not focus on them.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The attacker may employ active attacks such as packet dropping or passive attacks such as eavesdropping on the signals. Several solutions have been proposed in the literature by various researchers to mitigate such attacks [ 6 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 ]. Source location privacy (SLP) protection techniques are the name given to these solutions.…”
Section: Introductionmentioning
confidence: 99%
“…The scheme by authors enhances the diversity and randomness of the route positions across the network in the phantom source nodes (Jia et al , 2017). The selection of the next-hop node takes into account the residual energy of the candidate nodes (Wang et al , 2021). The paper examines privacy-aware protocols in routing protocols, parameters and trade-offs in WSNs under practical scenarios (Gu, 2018).…”
Section: Related Workmentioning
confidence: 99%