25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
DOI: 10.1109/icdcs.2005.31
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Source-Location Privacy in Sensor Network Routing

Abstract: Abstract-One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy. Adversaries may use RF localization techniques to perform hop-by-hop traceback to the source sensor's location. This paper provides a formal model for the source-location privacy problem in sensor networks an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
642
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 411 publications
(643 citation statements)
references
References 20 publications
1
642
0
Order By: Relevance
“…The problem of source location privacy first appeared around 2004 [7] [15]. Since then, the problem has been addressed using a variety of attacker models and assumptions.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The problem of source location privacy first appeared around 2004 [7] [15]. Since then, the problem has been addressed using a variety of attacker models and assumptions.…”
Section: Related Workmentioning
confidence: 99%
“…In another work, Kamath et al [8] presented an approach that used triangulation to locate targets. In contrast, in a seminal paper on source location privacy, Kamat et al [7] assume a single attacker, who can use the adopted routing protocol to infer the location of a source node. For example, in a military environment, soldiers on surveillance may relay information to a sink.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations