Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.3390/s18072291
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are deployed in sensitive applications, such as in military and asset monitoring. In these applications, it is important to ensure good source location privacy. This is owing to the open nature of WSNs and the easiness of an adversary to eavesdrop on sensor communication and back trace the location of the source node. This paper proposes a scheme to preserve the source location privacy based on random routing techniques. To achieve high privacy, packets are randomly routed from … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(39 citation statements)
references
References 14 publications
0
38
0
Order By: Relevance
“…The second phase is the operational phase where packets are routed from the source node to the sink node by using the proposed routing protocols. During the network configuration phase, the network uses the network initialization process similar to References [3,8] as a technique for neighbor discovery and hop-count estimation of the nodes with respect to the sink node. The network uses the k-nearest neighbor tracking approach to track the assets.…”
Section: Network Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…The second phase is the operational phase where packets are routed from the source node to the sink node by using the proposed routing protocols. During the network configuration phase, the network uses the network initialization process similar to References [3,8] as a technique for neighbor discovery and hop-count estimation of the nodes with respect to the sink node. The network uses the k-nearest neighbor tracking approach to track the assets.…”
Section: Network Modelmentioning
confidence: 99%
“…(2) Attack success rate (ASR): the measure of the rate of source node traceability when an eavesdropping adversary is back tracing against a SLP routing protocol. It is computed by counting the number of successful adversary attempts [8]. ASR has an inversely proportional relationship with the safety period.…”
Section: Performance Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, energy-efficient routing protocols enable the WSNs to achieve long unattended operation time [2]. SLP protection is defined as the process of minimizing the traceability and observability of a source node by an attacker in monitoring WSNs [4], [7]. In this study, we focus on investigating the performance of SLP routing protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Also the discovery and recovery procedures are time and energy consuming. The new class of protocols known as geographic routing protocols [18][19][20][21][22] used location information to route the packets in a hop by hop fashion from the source device to the destination device. Most of these protocols selects the device that has maximum progress to the destination (nearest to the destination) as the best forwarder to forward the data packet.…”
Section: Introductionmentioning
confidence: 99%