IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.227
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Receiver-Location Privacy in Wireless Sensor Networks

Abstract: Abstract-Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physically. After studying the adversary's behavior patterns, we present countermeasures to this problem. We propose a locationprivacy routing protocol (LPR) that is easy to implement and provides path diversity. Combining with fake packet injection, LPR is able to minimize the traffic direction information that an adversary can retri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
105
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 131 publications
(105 citation statements)
references
References 18 publications
0
105
0
Order By: Relevance
“…In their schemes, secure multi-path routing to multiple destination base stations is designed to provide intrusion tolerance against isolation of base station and anti-traffic analysis is proposed to disguise the location of base station. [18] proposes a locationprivacy routing protocol that provides path diversity combined with fake packet injection to protect receiver-location privacy.…”
Section: Discussion 1) Mobility Of Objectmentioning
confidence: 99%
“…In their schemes, secure multi-path routing to multiple destination base stations is designed to provide intrusion tolerance against isolation of base station and anti-traffic analysis is proposed to disguise the location of base station. [18] proposes a locationprivacy routing protocol that provides path diversity combined with fake packet injection to protect receiver-location privacy.…”
Section: Discussion 1) Mobility Of Objectmentioning
confidence: 99%
“…DEFP [3] is a parent-child routing which support fake packet injection mechanism to protect the sink. The real direction of packet flows may be hidden from the adversary by injecting fake packets to the nodes and making the direction of ingoing and outgoing packets uniformly distributed.LPR(Location Privacy Routing) [4] is another routing technique that is based on fake packet injection. GROW(Greedy random Walk) [5] is another source location protection technique based on the method of random routing.…”
Section: Related Workmentioning
confidence: 99%
“…They have also proposed in [15] to defend against the traffic analysis attacks by using multi-path routing and fake message injection to hide the location of the base station. LPR [16] provides the receiver location privacy against the packet tracing attacks. In LPR, the message flows incoming from and outgoing to a sensor node are uniformly distributed, which makes it difficult for an adversary to ascertain the direction of the sink.…”
Section: Related Workmentioning
confidence: 99%