2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2011
DOI: 10.1109/infcomw.2011.5928957
|View full text |Cite
|
Sign up to set email alerts
|

Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…The reason for having superior performances will be understood after the protocol becomes described. Ying et al [34] designed a concealing sink location (CSL) protocol that made a node generate the same traffic volume with the sink's neighbors by transmitting a number of fake messages. This feature enables CSL to prevent the traffic analysis attack launched by a global adversary.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The reason for having superior performances will be understood after the protocol becomes described. Ying et al [34] designed a concealing sink location (CSL) protocol that made a node generate the same traffic volume with the sink's neighbors by transmitting a number of fake messages. This feature enables CSL to prevent the traffic analysis attack launched by a global adversary.…”
Section: Related Workmentioning
confidence: 99%
“…Such conditions are restrictive and do not apply to many cases of WSN deployments. Compared to [34], our protocol can remove some of CSL's drawbacks. In this case, a node generates fake messages according to the total number of nodes whose routing path to the sink passes the node (we have named them as 'kids' of the node).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Two types of sink location attacks can be used to determine the location of the sink, the global traffic analysis attack (GTA) [5][6][7][8][9] and the local traffic analysis attack (LTA) [10][11][12][13][14]. Existing sink location protection protocols mostly consider the local traffic analysis attack.…”
Section: Introductionmentioning
confidence: 99%
“…There are several solutions proposed to defend against global attackers [5][6][7][8][9]. However, some of them generated high traffic volumes around the sink [5,6,9].…”
Section: Introductionmentioning
confidence: 99%