International Performance Computing and Communications Conference 2010
DOI: 10.1109/pccc.2010.5682341
|View full text |Cite
|
Sign up to set email alerts
|

From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks

Abstract: Wireless sensor networks (WSNs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…Some have investigated the problem of base station-location privacy [22] and providing location privacy to multiple nodes at once [23]. Others have focused on more powerful attackers, such as global attackers [7] or coordinated multiple attackers [14].…”
Section: Related Workmentioning
confidence: 99%
“…Some have investigated the problem of base station-location privacy [22] and providing location privacy to multiple nodes at once [23]. Others have focused on more powerful attackers, such as global attackers [7] or coordinated multiple attackers [14].…”
Section: Related Workmentioning
confidence: 99%
“…The techniques described in [14] and [15] cannot protect against the global attacker. (2)Sink's location privacy protection A variety of approaches have been used for this purpose, such as fake message injection, randomization of forwarding delay, and use of fake sinks in order to hide the real sinks' positions [3,5,6,[23][24][25][26][27][28][29][30][31][32][33]. For example, Nezhad et al [24] proposed an anonymous topology discovery protocol where all nodes were allowed to forward route discovery messages and incoming/outgoing labels assigned to nodes.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme provides a balance between the packet delivery latency and the sink's location privacy. Yao et al [32] and Chen et al [33] studied further the random-walk approach of [31]. However, Li et al, Yao, and Chen and Lou [31][32][33] cannot resist passive traffic analysis attacks under a global attacker.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations