2007 IEEE International Conference on Network Protocols 2007
DOI: 10.1109/icnp.2007.4375862
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Sensor Networks Against a Global Eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
206
1

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 182 publications
(214 citation statements)
references
References 20 publications
0
206
1
Order By: Relevance
“…This is in contrast with earlier work, where a set of fake sources is chosen at deployment time, is known a priori or requires network-wide knowledge to generate [7]. Note that, ideally, for maximum privacy, every node apart from the real source needs to be a fake source [13]. However, such an approach is not energy-efficient.…”
Section: Design Decisionsmentioning
confidence: 50%
See 2 more Smart Citations
“…This is in contrast with earlier work, where a set of fake sources is chosen at deployment time, is known a priori or requires network-wide knowledge to generate [7]. Note that, ideally, for maximum privacy, every node apart from the real source needs to be a fake source [13]. However, such an approach is not energy-efficient.…”
Section: Design Decisionsmentioning
confidence: 50%
“…For example, Mehta et al [13] assume that an attacker has a small wireless network of his own that can capture messages and shows how the location of source nodes can be inferred once messages have been intercepted. In another work, Kamath et al [8] presented an approach that used triangulation to locate targets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the collected network-wide traffic, the attacker can conduct traffic analysis to identify the potentially real sources. Under such a strong attack model, the corresponding countermeasures focus on making all sensors [4], [5], [6], [7] or k sensors [4] transmit (dummy) messages at the same or similar pattern to disguise the real source location. In general, such approaches are more robust to traffic analysis, at the cost of higher message overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a passive global attack model has been studied [4], [5], [6], [7], where the attacker is assumed to be capable of monitoring all the network traffic by either deploying simple sensors covering the network or employing powerful site surveillance devices with hearing range no less than the network radius. With the collected network-wide traffic, the attacker can conduct traffic analysis to identify the potentially real sources.…”
Section: Introductionmentioning
confidence: 99%