2018
DOI: 10.1016/j.cose.2018.03.002
|View full text |Cite
|
Sign up to set email alerts
|

Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…• The manuscript conducts a thorough performance evaluation, considering multiple metrics to assess the efficiency and effectiveness of the LPWSN-DSRNN-MOA method. This contributes to a comprehensive understanding of the proposed approach's strengths and limitations [17,18]. In summary, the LPWSN-DSRNN-MOA method contributes novel combinations of neural network architecture, optimization algorithms, and pre-processing techniques to enhance the protection of sensitive location information in WSNs, demonstrating its efficacy through rigorous implementation and evaluation.…”
Section: A Contribution Statementmentioning
confidence: 94%
“…• The manuscript conducts a thorough performance evaluation, considering multiple metrics to assess the efficiency and effectiveness of the LPWSN-DSRNN-MOA method. This contributes to a comprehensive understanding of the proposed approach's strengths and limitations [17,18]. In summary, the LPWSN-DSRNN-MOA method contributes novel combinations of neural network architecture, optimization algorithms, and pre-processing techniques to enhance the protection of sensitive location information in WSNs, demonstrating its efficacy through rigorous implementation and evaluation.…”
Section: A Contribution Statementmentioning
confidence: 94%
“…With the increase of branches, the security period is greatly enhanced while the tree-shape route leads the additional energy overhead. Moreover, the staircase and branching scheme was introduced to prevent backtracking along the routing paths [10]. The stochastic and diffusive routing using multiple virtual source (SDR-m) technology was proposed [23].…”
Section: Related Workmentioning
confidence: 99%
“…And the fake packet injection is another well-known method against backtracking attacks. This method embeds fake traffic into real data making it difficult for attackers to distinguish real traffic from fake data and thus guarantees the security of source location [10]. Due to the reason that the fake source is generated statically, attackers can easily find the location of the fake source and thus discard it to find the real one [11].…”
Section: Introductionmentioning
confidence: 99%
“…Source location privacy is an emerging area in event-driven applications such as military and wildlife tracking applications. At any time, the sensor node becomes a source node, and thus when event is detected by a node, the message for a specific event is transmitted to the sink node [3][4][5]. In many cases, the source node can be easily located through the shared wireless transmission medium.…”
Section: Introductionmentioning
confidence: 99%