2017
DOI: 10.1109/tifs.2017.2698424
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Flooding [2] all nodes participate in transmission consume too much energy can be applied to smallscale transmission Two-phase routing [3] searching area of the adversary is increased locations of virtual sources must be carefully designed can be adopted in a cluster structure Intermediate nodes [4] searching area of the adversary is increased there is too much randomness can be simulated into a random relay node Proxy node routing [5] multiple routing paths are created transmission delay may increase can be simulated into a random relay node Three-level security protection [6] can provide a high privacy protection consume too much energy of nodes can be applicable in underwater environment Machine learning [7] monitoring range of the adversary is estimated global information is needed not easy to implement in underwater environment Message mapping [8] can cope with global adversary global information is needed not easy to implement in underwater environment Fake source scheduling [9] searching area of the adversary is increased prior knowledge of the adversary location is needed this can be applicable in underwater environment Scheme decision procedure [10] with a variety of options nodes need to deploy multiple transmission schemes in advance cannot be used in underwater environment and continued. This has similar mechanism to the leaderfollower AUVs.…”
Section: Methods Advantage Disadvantage Underwater Extension Capabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Flooding [2] all nodes participate in transmission consume too much energy can be applied to smallscale transmission Two-phase routing [3] searching area of the adversary is increased locations of virtual sources must be carefully designed can be adopted in a cluster structure Intermediate nodes [4] searching area of the adversary is increased there is too much randomness can be simulated into a random relay node Proxy node routing [5] multiple routing paths are created transmission delay may increase can be simulated into a random relay node Three-level security protection [6] can provide a high privacy protection consume too much energy of nodes can be applicable in underwater environment Machine learning [7] monitoring range of the adversary is estimated global information is needed not easy to implement in underwater environment Message mapping [8] can cope with global adversary global information is needed not easy to implement in underwater environment Fake source scheduling [9] searching area of the adversary is increased prior knowledge of the adversary location is needed this can be applicable in underwater environment Scheme decision procedure [10] with a variety of options nodes need to deploy multiple transmission schemes in advance cannot be used in underwater environment and continued. This has similar mechanism to the leaderfollower AUVs.…”
Section: Methods Advantage Disadvantage Underwater Extension Capabilitymentioning
confidence: 99%
“…Recently, a lot of attention for SLP protection has been paid to resist the adversary's attack [7,8,9]. Koh et al used machine learning, viz.…”
Section: A Location Privacy Schemes In Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, multi-path routing without careful deployment suffers from high energy consumption during the transmission. Thus, several flavors of this category focusing on reduced energy consumption in multi-path routing are proposed in [ 20 , 21 , 22 ]. Network Encoded Routing: In this routing, packets are re-encoded, split into multiple small packets, or integrated into one big packet during the transmission.…”
Section: Wsn Routing and Attack Mechanismmentioning
confidence: 99%
“…In this work, the dynamical adjustment of node emission radius is complex. Koh et al [28] have proposed multipath routing named optimal privacy-enhancing routing algorithm (OPERA). The authors have considered global adversary for both lossy and lossless observations that used Bayesian Maximum Posteriori (MAP) estimation scheme.…”
Section: State Of the Artmentioning
confidence: 99%