2015
DOI: 10.1016/j.procs.2015.07.486
|View full text |Cite
|
Sign up to set email alerts
|

Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) consist of numbers of small nodes that can sense, collect, and disseminate information for many different types of applications. One of these applications is subject tracking and monitoring, in which the monitored subjects often need protection. For instance, a WSN can be deployed to monitor the movement of a panda in a large park. The panda needs protection from different adversaries. An adversary might trace the messages in the WSNs to find the source node that sensed the pand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…There exist several protocol designs which adopt both the phantom routing and fake source packet routing strategies. The protocols include the tree-based diversionary routing [4], the enhanced source location privacy based on data dissemination protocol [7], the probabilistic source location privacy protection protocol [20], and the distributed protocol that combines fake source routing and phantom source routing [33]. The tree-based diversionary routing functions as follows; a phantom node is established and a backbone route is created based on the location of the phantom node.…”
Section: Related Workmentioning
confidence: 99%
“…There exist several protocol designs which adopt both the phantom routing and fake source packet routing strategies. The protocols include the tree-based diversionary routing [4], the enhanced source location privacy based on data dissemination protocol [7], the probabilistic source location privacy protection protocol [20], and the distributed protocol that combines fake source routing and phantom source routing [33]. The tree-based diversionary routing functions as follows; a phantom node is established and a backbone route is created based on the location of the phantom node.…”
Section: Related Workmentioning
confidence: 99%
“…Other protocols which adopt the fake packet routing strategies include the probabilistic source location privacy protection protocol [18], timed efficient privacy preservation protocol [27], fake network traffic-based protocol [28], bidirectional tree protocol [29], dummy adaptive distribution protocol [26], distributed fake source and phantom source protocol [17], controlled dummy adaptive distribution protocol [26], and the redundancy branch convergence-based privacy protocol [30]. To route packets, the probabilistic source location privacy protection protocol selects phantom nodes around the source node with careful consideration of the exposed areas.…”
Section: Privacy Protection Protocols With Fake Packet Injection mentioning
confidence: 99%
“…Thus, in this study, we conduct comprehensive performance evaluation of four representative fake packetbased protocols which employ different fake packet routing strategies. We evaluate the performance of the tree-based diversionary routing protocol (TDR) [15], data dissemination routing protocol (DDR) [16], distributed protocol with fake source and phantom source routing (FPR) [17], and the probabilistic source location privacy protection protocol (PRR) [18]. The key features and routing strategies of the TDR, DDR, FPR, and PRR protocols are summarized in Fig.…”
Section: Motivation and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Fake packets are of the same length as the real packets, and they are encrypted so as to make it difficult for adversaries to tell the difference between fake and real packets. Several versions of fake source routing exist, including short-lived fake source routing, persistent fake source routing, dynamic fake source routing, and a distributed solution that combines fake source routing and phantom routing [10]. Fake source routing schemes are often criticized for their poor privacy and high-energy consumption.…”
Section: Related Workmentioning
confidence: 99%