2010 International Conference on Information Science and Applications 2010
DOI: 10.1109/icisa.2010.5480564
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(37 citation statements)
references
References 7 publications
0
37
0
Order By: Relevance
“…A variety of approaches that do not rely on the use of dummy messages have also been proposed to address the SLP problem [4,14,15,16,17]. In particular, Ozturk et al [8] and Kamat et al [3] proposed a two-phase solution.…”
Section: Related Workmentioning
confidence: 99%
“…A variety of approaches that do not rely on the use of dummy messages have also been proposed to address the SLP problem [4,14,15,16,17]. In particular, Ozturk et al [8] and Kamat et al [3] proposed a two-phase solution.…”
Section: Related Workmentioning
confidence: 99%
“…However, works such as in [3,6,13,19,20] do not use dummy messages. In particular, [17] and [9] proposed a two-phase solution called phantom routing scheme (PRS).…”
Section: Related Workmentioning
confidence: 99%
“…The main drawback of fake packet injection is that the injected traffic will undoubtedly decrease network throughput and increase power consumption, especially for resource-constrained wireless networks such as wireless sensor networks. ACS (Anonymous Communication Scheme) is proposed in [14], which adopts the keyed hash result of address and sequence number as addresses. As the sequence number is increased on successful transmission, the resulting address changes dynamically and is unknown to adversaries.…”
Section: Related Workmentioning
confidence: 99%