2020
DOI: 10.3390/en13020292
|View full text |Cite
|
Sign up to set email alerts
|

Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks

Abstract: Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the attacks, adversaries analyze the traffic pattern to obtain critical information such as the location information of a source node. Fake source packet routing protocols are often used to ensure source location privacy (SLP) protection. The protocols rely on broadcasting fake packets from fake sources concurrently with the transmission of real packets from the real source nodes to obfuscate the adversaries. However, fake so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(28 citation statements)
references
References 35 publications
0
27
0
Order By: Relevance
“…Various routing strategies have been proposed for SLP protection. Many of the strategies are described in [4], [11]- [13], [21]. In [22], it was established that baseline fake packet routing and probabilistic fake packet routing strategies can be used to preserve SLP in monitoring WSNs.…”
Section: Privacy Protection Protocols With Fake Packet Injection mentioning
confidence: 99%
See 3 more Smart Citations
“…Various routing strategies have been proposed for SLP protection. Many of the strategies are described in [4], [11]- [13], [21]. In [22], it was established that baseline fake packet routing and probabilistic fake packet routing strategies can be used to preserve SLP in monitoring WSNs.…”
Section: Privacy Protection Protocols With Fake Packet Injection mentioning
confidence: 99%
“…bility [4]- [6]. When the WSNs are used in safety-critical and long-term monitoring applications such as monitoring of high value assets, the routing protocols are expected to warranty desirable features such as energy efficiency, low delay, reliable packet delivery, and high levels of source location privacy (SLP) protection.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The branch near the source node collects and transmits the real packets to the ring. The real packet is sent to the ring by a nearby branch and, after several hops within the ring, travels to the sink node.In [37], with sink as the center, using two concentric circles to build a two-level phantom routing strategy. The packets start from the source and arrive at the sink through a first level phantom node and a second level phantom node.…”
Section: B Slp Schemes Using Ringmentioning
confidence: 99%