2011
DOI: 10.1109/jsac.2011.110813
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…In [18] the authors have used replication technique using random hops to ensure data survivability. Since every replica is associated to a source node, the authors have mentioned that increasing the number of replicas exposes the location of the source to the adversary.…”
Section: Related Workmentioning
confidence: 99%
“…In [18] the authors have used replication technique using random hops to ensure data survivability. Since every replica is associated to a source node, the authors have mentioned that increasing the number of replicas exposes the location of the source to the adversary.…”
Section: Related Workmentioning
confidence: 99%
“…The cell size is set such that a sensor node can reach the CH of its cell, if there is one (Intra-Cluster Communication), and each Base-Station Sensor Node Figure 1: Illustrating how an adversary analyze the traffic using Evidence Theory to detect the location of the BS. (5,9,8,2), E (5,9,8,3), E (5,9,8,4), E (5,9,8,7), E (5,9,8,9), E (5,9,8,12), E (5,9,8,13), E (5,9,8,14) 1 1/27=0.04 CH to reach the CH of a neighbor cell (Inter-Cluster Communication). In addition, the network initialization includes the formation of a temporary flat routing topology in which a multi-hop path is designated from each sensor to the BS.…”
Section: A Initialization and Cluster Formationmentioning
confidence: 99%
“…In order to prevent the adversary from distinguishing the BS through the packet header, the identity of the sensor nodes and BS are often concealed by applying anonymous routing techniques [3][4] [5][6] [7]. However, the operation model of a WSN makes it possible to determine the location of the BS by intercepting transmissions and employing traffic analysis techniques such as Evidence Theory (ET).…”
Section: Introductionmentioning
confidence: 99%
“…Contemporary security mechanisms, such as packet header encryption and anonymous routing mechanisms, are often applied to conceal the BS's identity . However, these security mechanisms do not prevent the adversary from eavesdropping on the network and using traffic analysis techniques such as evidence theory (ET) .…”
Section: Introductionmentioning
confidence: 99%