2019
DOI: 10.1002/cpe.5304
|View full text |Cite
|
Sign up to set email alerts
|

Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks

Abstract: Source location privacy (SLP) is an important property for a large class of security-critical wireless sensor network (WSN) applications such as monitoring and tracking. In the seminal work on SLP, phantom routing was proposed as a viable approach to address SLP. However, recent work has shown some limitations of phantom routing such as poor data yield and low SLP. In this paper, we propose phantom walkabouts, a novel and more general version of phantom routing, which performs phantom routes of variable length… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 36 publications
(47 reference statements)
0
8
0
Order By: Relevance
“…Some of the recently proposed SLP protocols include the two-level phantom with a pursue ring protocol [12], unified single and multi-path routing protocol [13], dynamic multipath routing protocol [17], grid-based single phantom node protocol [34], data dissemination protocol [37], and the protocol based on anonymity cloud [43]. Other recently proposed SLP protocols include the cloud-based with multi-sinks protocol [14], protocol based on phantom nodes, rings, and fake paths [16], phantom walkabouts protocol [18], grid-based dual phantom node protocol [34], two-level phantom with a backbone route protocol [12], probabilistic routing protocol [44], and the circular trap protocol [45].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of the recently proposed SLP protocols include the two-level phantom with a pursue ring protocol [12], unified single and multi-path routing protocol [13], dynamic multipath routing protocol [17], grid-based single phantom node protocol [34], data dissemination protocol [37], and the protocol based on anonymity cloud [43]. Other recently proposed SLP protocols include the cloud-based with multi-sinks protocol [14], protocol based on phantom nodes, rings, and fake paths [16], phantom walkabouts protocol [18], grid-based dual phantom node protocol [34], two-level phantom with a backbone route protocol [12], probabilistic routing protocol [44], and the circular trap protocol [45].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is important to ensure energy-efficient communications and location privacy protection in WSNs [13], [16]- [18]. Moreover, the dynamicity of WSNs is greater as sensor nodes fail more often due to the limited battery power and harsh application environments [19].…”
Section: Introductionmentioning
confidence: 99%
“…The phantom routing strategy has been widely explored in the literature, and it has been adopted in many existing protocols. Examples of routing protocols which adopt phantom routing include the trace cost based source location privacy protection scheme [9], phantom walkabouts routing protocol [13], the phantom routing with locational angle [22], and the energy efficient privacy preserved routing algorithm [23]. Similarly, the phantom routing strategy is adopted in the multiple-phantom nodes routing scheme [24], the grid-based single phantom node and grid-based dual phantom node source location privacy protection schemes [25], the self-adjusting directed random walk approach [26], and the pseudo normal distribution-based phantom routing protocol [27].…”
Section: Related Workmentioning
confidence: 99%
“…Then, the packets are transmitted from the phantom node to the destination sink node through flooding, single-path routing, or some alternative strategies [2,12]. The phantom routing strategy is simple and offers low SLP protection when used in its simple form [13]. In the fake packet routing strategy, fake sources are designed to mimic the functions of the real source nodes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation