2020
DOI: 10.1504/ijcnds.2020.110521
|View full text |Cite
|
Sign up to set email alerts
|

Increasing base-station anonymity through illusive void formation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…To mitigate such a threat, many countermeasures are proposed to prevent, or at least delay, an adversary from locating the BS. Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations.…”
Section: A Traffic Analysis Threatmentioning
confidence: 99%
See 2 more Smart Citations
“…To mitigate such a threat, many countermeasures are proposed to prevent, or at least delay, an adversary from locating the BS. Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations.…”
Section: A Traffic Analysis Threatmentioning
confidence: 99%
“…An adversary would aim at identifying the role, location, and identity of WSN nodes to gain knowledge about the structure of the network and distinguish vital assets that could be attacked [39], [40]. Therefore, privacy and security in WSN has received a lot of attention from the research community [9], [10], [11], [12], [13], [14], [22], [26], [27], [28], [29], [30], [31], [41], [42], [43]. Particularly, concealing the role and location of BS is deemed to be more crucial [9], [44].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…FIVA [13] exploits the effect of a void on geographic routings to form a routing topology that mimics the presence of a void region surrounding the BS. Therefore, the adversary would shift its attention away from the void region that the BS is residing in.…”
Section: Iii) Routing Topology Obfuscationmentioning
confidence: 99%
“…These countermeasures pursue strategies on the physical, link and network layers of the communication protocol stack. In [7], we have proposed FIVA (Formation of Illusive Void for increased BS Anonymity) which strives to confuse the adversary by forming a fake void around the BS in order to give the illusion that there are no nodes in the BS vicinity and no packets are forwarded. The BS still receives the data through designating one node as a Covert Gateway (CG).…”
Section: Introductionmentioning
confidence: 99%