2013
DOI: 10.1002/cpe.3075
|View full text |Cite
|
Sign up to set email alerts
|

Protecting source–location privacy based on multirings in wireless sensor networks

Abstract: Summary Wireless sensor networks (WSNs) are expected to be widely deployed to collect data in military and civilian applications. Because of the open nature of WSNs, it is easy for an adversary to eavesdrop sensor communication and to trace packets, causing privacy concern for the sensor devices. The privacy issue, especially location privacy, can be critical for monitoring applications in WSNs. A unique case of location privacy is that of the sources, which are vulnerable of being captured and target attacks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…Some of these observations have been used in previous work, while others have not. For example, having the route approach the sink from a direction other than the one the source is in has been used in Phantom Routing [3] and Ring-based Routing [7]. We have also seen algorithms whose routes occasionally take the shortest path [26].…”
Section: Model Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of these observations have been used in previous work, while others have not. For example, having the route approach the sink from a direction other than the one the source is in has been used in Phantom Routing [3] and Ring-based Routing [7]. We have also seen algorithms whose routes occasionally take the shortest path [26].…”
Section: Model Resultsmentioning
confidence: 99%
“…Several solutions aimed to improve the directed random walk phase of phantom routing, such as angle-based routing [6] which chooses the next node based on angles between key nodes. Other routing-based techniques involve routing in a ring around the sink before finally reaching it [7].…”
Section: Related Workmentioning
confidence: 99%
“…However, there have been many variations since such as GROW [24] which uses a bloom filter to prevent the walk doubling back on itself, techniques that allocate the phantom node in a specific area whilst avoiding direction information leakage [11] and angle-based techniques [21,23] which calculate angles between certain nodes to influence the direction of the walk. Other techniques have adapted the random walk such that it forms a ring around the source and messages are routed through the ring before being forwarded onwards to the source [10,25].…”
Section: Related Workmentioning
confidence: 99%
“…There has been much work developing improved version of the directed random walk phase of phantom routing, such as GROW [6] which uses a bloom filter to prevent the walk doubling back on itself and angle-based techniques [7,8] which calculate angles between certain nodes to influence the direction of the walk. Other techniques have adapted the random walk such that it forms a ring around the source and messages are routed through the ring before being forwarded onwards to the source [9,10].…”
Section: Related Workmentioning
confidence: 99%