2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) 2017
DOI: 10.1109/ispcc.2017.8269701
|View full text |Cite
|
Sign up to set email alerts
|

Boosting anonymity in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations. In almost all countermeasures, improving the BS location anonymity comes at the expense of higher transmission rates by the individual nodes.…”
Section: A Traffic Analysis Threatmentioning
confidence: 99%
See 1 more Smart Citation
“…Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations. In almost all countermeasures, improving the BS location anonymity comes at the expense of higher transmission rates by the individual nodes.…”
Section: A Traffic Analysis Threatmentioning
confidence: 99%
“…Some nodes are designated across the network to temporarily store data until BS moves close to them to collect the data. On the other hand, Kumar et al [32] divide the network into multi-layer rings and let BS move freely and send its location to nodes in the central ring. Other nodes query the central ring to learn about the actual location of BS.…”
Section: ) Exploiting Bs Mobilitymentioning
confidence: 99%
“…Liu et al [53] propose having a mobile sink to move in a semi-random circular pattern to collect the data from selected nodes that are storing the data until the BS becomes within reach. Kumar et al in [54] divide the network into multi-layer rings. A mobile BS sends its new location to the nodes in the central ring.…”
Section: I) Bs Replication/relocationmentioning
confidence: 99%
“…A lottery model is employed to choose a neighbor to forward the fake packets to and cause local hot spots that divert the adversary's attention away from the BS. Kumar et al [54] have proposed generating and routing fake packets over a multi-layer ring. The BS sends a fake packet to the farthest ring from its current location to trigger a fake flood within the selected ring.…”
Section: Iv) Introducing Cover-up Trafficmentioning
confidence: 99%
“…Also, they used the Hamiltonian cycle to make the SN appears as a normal node in the cycle. In [14] the researchers used a ring nodes around the mobile SN to store its location information. Thus, all the nodes can communicate with the SN via this ring.…”
Section: Related Workmentioning
confidence: 99%