Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks 2004
DOI: 10.1145/1029102.1029117
|View full text |Cite
|
Sign up to set email alerts
|

Source-location privacy in energy-constrained sensor network routing

Abstract: As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is confidentiality of the source sensor's location. In this paper, we focus on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
315
0
1

Year Published

2006
2006
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 332 publications
(316 citation statements)
references
References 16 publications
0
315
0
1
Order By: Relevance
“…The problem of source location privacy first appeared around 2004 [7] [15]. Since then, the problem has been addressed using a variety of attacker models and assumptions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem of source location privacy first appeared around 2004 [7] [15]. Since then, the problem has been addressed using a variety of attacker models and assumptions.…”
Section: Related Workmentioning
confidence: 99%
“…These varied attacker models and assumptions have led to the development of many solutions and techniques for enhancing source location privacy. Ozturk et al [15] investigated the privacy imparted by flooding, and several other techniques such as fake source and phantom routing. A similar investigation was performed by Kamat et al [7].…”
Section: Related Workmentioning
confidence: 99%
“…Preserving source-location privacy in WSNs was proposed by C. Ozturk et.al. [15]. This work proposes randomization techniques such as fake packets, persistent fake sources, and a random walk to hide the location of the source of data packet from discovery.…”
Section: Related Workmentioning
confidence: 99%
“…In an asset monitoring network [1], [2], when an endangered animal (e.g., panda) appears in the network, an event notification message will be delivered to the base station (BS). A nonconforming hunter may identify the source location and capture the animal by monitoring network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…In an active local attack model 1 [1], [2], [3], an attacker's hearing range is assumed to be comparable to that of regular sensors. The attacker tries to trace back to the real source in a hop-by-hop fashion, given that the real event source emits packets continuously for a period of time.…”
Section: Introductionmentioning
confidence: 99%