2018
DOI: 10.1016/j.jpdc.2018.01.006
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid online protocols for source location privacy in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
39
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 37 publications
(40 citation statements)
references
References 46 publications
1
39
0
Order By: Relevance
“…The fake sources and real sources send packets simultaneously to confuse the adversary. The fake source packet routing strategy has been adopted in many existing protocols including the dummy packet injection scheme [12], the dynamic fake sources-based algorithm [16], and the hybrid online dynamic single path routing algorithm [18]. Similarly, the fake source packet routing strategy is adopted in the forward random walk and bidirectional tree schemes [29], the fake network traffic-based scheme [30], the timed efficient source privacy preservation scheme [31], and the dummy uniform distribution, dummy adaptive distribution, and controlled dummy adaptive distribution protocols [32].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The fake sources and real sources send packets simultaneously to confuse the adversary. The fake source packet routing strategy has been adopted in many existing protocols including the dummy packet injection scheme [12], the dynamic fake sources-based algorithm [16], and the hybrid online dynamic single path routing algorithm [18]. Similarly, the fake source packet routing strategy is adopted in the forward random walk and bidirectional tree schemes [29], the fake network traffic-based scheme [30], the timed efficient source privacy preservation scheme [31], and the dummy uniform distribution, dummy adaptive distribution, and controlled dummy adaptive distribution protocols [32].…”
Section: Related Workmentioning
confidence: 99%
“…However, to effectively obfuscate an adversary, the protocols often distribute a large amount of fake packet traffic in the network. Consequently, the protocols incur exhaustive energy consumption, routing congestion problems, packet collisions, and packet loss events [2,13,[17][18][19]. As a result, the packet delivery ratio (PDR) and end-to-end delay (EED) performance of the protocols are affected [11].…”
Section: Introductionmentioning
confidence: 99%
“…While deploying algorithms on FlockLab, an issue we encountered was that time was not correctly synchronised between nodes 4 . This issue was corrected by using a more accurate time server 5 .…”
Section: Time Synchronisation Of the Global Testbed Clockmentioning
confidence: 99%
“…An example is Source Location Privacy (SLP) [6], where a WSN is intended to be deployed over a large outside area to monitor valuable assets in which the network should not reveal the asset's location by the path messages take. A sparse network is required because some techniques (such as [5]) require sufficient spatial redundancy to provide effective privacy. One option to reduce the density in a network is for nodes to be turned off.…”
Section: Introductionmentioning
confidence: 99%
“…WSN is a set of sensor nodes. Miscellany of routing protocol for WSN is an inspiring task because the without routing WSN will not enhance the security[14].…”
mentioning
confidence: 99%