2019
DOI: 10.1007/978-3-319-91146-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 58 publications
0
4
0
Order By: Relevance
“…Results show that this technique performs better than the other similar approaches, 34,35 but it lacks the privacy of sink node. Authors in previous studies [36][37][38][39][40] have presented their solution to protect the location of base station; however, their techniques did not incorporate SDN in any way.…”
Section: Bs Location Privacy In Traditional Iot Wsnsmentioning
confidence: 99%
“…Results show that this technique performs better than the other similar approaches, 34,35 but it lacks the privacy of sink node. Authors in previous studies [36][37][38][39][40] have presented their solution to protect the location of base station; however, their techniques did not incorporate SDN in any way.…”
Section: Bs Location Privacy In Traditional Iot Wsnsmentioning
confidence: 99%
“…To our best knowledge, published countermeasures have assumed that an adversary applies the GSAT or ET model [8][13][14] [17]. GSAT is solely based on traffic volume, while ET utilizes only spatial correlation of consecutive transmissions.…”
Section: B Comparison With Prior Workmentioning
confidence: 99%
“…Assessing the BS anonymity has been the focus of studies such as [8][12]- [24] [63] and is in general a byproduct of the traffic analysis model. In this paper, ET is pursued as the underlying traffic analysis model where each intercepted transmission is deemed as an evidence of direct communication between a sender-receiver pair; the sender is determined by localizing the transmitter, while the receiver could be any node in a set of potential candidates within the sender's reachable range.…”
Section: A Overview Of Evidence Theorymentioning
confidence: 99%
See 1 more Smart Citation