2019
DOI: 10.1016/j.comnet.2019.106880
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the effectiveness of transmission power control as a location privacy technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Moreover, the authors proposed a technique in which sensor nodes can be inactive for long periods to save energy. However, the authors did not consider that off-the-shelf radios have power limitations that cannot always set the desired transmission power level [1]. Moreover, balancing energy consumption is achieved only for a predefined network deployment that is not well suited for all applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, the authors proposed a technique in which sensor nodes can be inactive for long periods to save energy. However, the authors did not consider that off-the-shelf radios have power limitations that cannot always set the desired transmission power level [1]. Moreover, balancing energy consumption is achieved only for a predefined network deployment that is not well suited for all applications.…”
Section: Related Workmentioning
confidence: 99%
“…However, in an irregular arrangement, it is not always possible to have a neighborhood with exactly 37.5% of active cells; thus, a range between 35% and 40% will be used instead. These rules follow a similar proportion as proposed in (1). Figure 12 shows the average number of active cells vs. the network lifetime in an irregular arrangement corresponding to a 2D square area measuring 100 m×100 m. The cell's radius is set to 15 m. One hundred sensors were randomly deployed.…”
Section: B Gos Vs Eerpmentioning
confidence: 99%
See 1 more Smart Citation
“…To protect users from the LE attack, Sanaa et al utilized the fake point to confuse the attackers [21]. Arana et al increased the localization error of attackers by controlling the transmission power [22]. Conventional cryptography is a primary method to protect location privacy from eavesdropping.…”
Section: Related Workmentioning
confidence: 99%
“…The third exception is the LE attack. Fortunately, once AP can avoid the approaching of an eavesdropper, e.g., AP is mobile, the above weaknesses can be eliminated by adopting TOF/TOA ranging and the dynamic transmission power [22]. Note that with TOF/TOA ranging, the user does not need to inform its current transmission power to the AP.…”
Section: Security Evaluationmentioning
confidence: 99%