2023
DOI: 10.1109/tii.2022.3183804
|View full text |Cite
|
Sign up to set email alerts
|

Position-Independent and Section-Based Source Location Privacy Protection in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…To increase the geographical location diversity of the phantom node and protect the source location's security, the authors employ the sector domain and the coordinates of the central node V. [49] proposed a pseudospiral-routing protocol based on the Archimedes curve to secure the location of the source and sink nodes. [50] proposed an effective Source Location Privacy (SLP) preservation method that provides privacy regardless of location of the node in the network.…”
Section: B Wsnmentioning
confidence: 99%
“…To increase the geographical location diversity of the phantom node and protect the source location's security, the authors employ the sector domain and the coordinates of the central node V. [49] proposed a pseudospiral-routing protocol based on the Archimedes curve to secure the location of the source and sink nodes. [50] proposed an effective Source Location Privacy (SLP) preservation method that provides privacy regardless of location of the node in the network.…”
Section: B Wsnmentioning
confidence: 99%
“…The method reduces to the shortest path scheme if the attacker does not revisit a node and waits until a new node encounters (Jan et al , 2021). The authors discuss a source location privacy preservation scheme based on biased random walk and greedy algorithm (Mukamanzi et al , 2022). The authors propose a scheme to improve location privacy of the source node.…”
Section: Related Workmentioning
confidence: 99%
“…1,2 Wireless sensor networks (WSN) are one of the parts of SIoT, which permit the interaction of an object with another object or people. 3 The SIoT faces several threats that affect its security, and some of the threats are node compromising, route disrupting, eavesdropping, and data fabricating. These attacks make the source location privacy (SLP) important for SIoT.…”
Section: Introductionmentioning
confidence: 99%
“…SIoT represents an extended social network that interconnects individuals with objects, fosters connections between individuals, and facilitates interactions between various objects 1,2 . Wireless sensor networks (WSN) are one of the parts of SIoT, which permit the interaction of an object with another object or people 3 . The SIoT faces several threats that affect its security, and some of the threats are node compromising, route disrupting, eavesdropping, and data fabricating.…”
Section: Introductionmentioning
confidence: 99%