2010
DOI: 10.1002/sec.245
|View full text |Cite
|
Sign up to set email alerts
|

On providing sink anonymity for wireless sensor networks

Abstract: Sinks usually broadcast their addresses for data collection in sensor networks. However, this common operation opens up vulnerability for adversary to attack the sinks and obstruct their normal functions. In this paper, we suggest sink anonymity as a novel approach for data collection, which protects the privacy of the sinks and avoids them from becoming the target of attacks. We provide sink anonymity by omitting the address of the sink in routing, so that the identity and location of the sink are kept privat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In the other hand, sink nodes of the network can detect and discard fake packets. It seems maximizing the number of dummy packet is an effective solution [11], [16]. But exceeding energy consumption is a serious barrier to let this method become a practical solution.…”
Section: Hybrid Energy-efficient Privacy Preserving Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In the other hand, sink nodes of the network can detect and discard fake packets. It seems maximizing the number of dummy packet is an effective solution [11], [16]. But exceeding energy consumption is a serious barrier to let this method become a practical solution.…”
Section: Hybrid Energy-efficient Privacy Preserving Schemementioning
confidence: 99%
“…Studying existing solutions in similar domains such as wireless sensor networks and MANET shows those approaches cannot be applied directly into the domain of smart home due to producing undesirable extra delay or increasing the energy consumption [8], [9]. Thus, in this paper, we propose a Hybrid Energy-Efficient Privacy Preserving Scheme which is improved version of dummy packet injection approach [10], [11] and a random timing interval generator for determining the transmitting slot. Suggested solution is a decision-making algorithm based on probability theorem and it works by aim of maximizing the confusion level of the attack in its way to discover the correct pattern.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, wireless sensor networks (WSNs) have attracted a great deal of research attention because of their wide range of potential applications including military, healthcare, and security . A typical sensor network usually has one base station that serves as the commander and data sink.…”
Section: Introductionmentioning
confidence: 99%