2022
DOI: 10.1109/jiot.2021.3126171
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Source Location Privacy in IoT-Enabled Wireless Sensor Networks: The Case of Multiple Assets

Abstract: A major limitation to the use of Wireless Sensor Networks (WSNs) in asset monitoring applications is the security and privacy concerns, particularly the privacy of source location information. In this paper, we develop two phantom routingbased solutions to provide source location privacy for the case of multi-source/asset scenario-the case that has received very little attention in the literature. The idea of phantom routing is to relay the packets to a distant node in a random fashion to obfuscate the traffic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…At first we compare our technique with Shortest Path Routing (SPR) and then with the other similar techniques (i.e., random walkbased SLP techniques) to evaluate its performance. The comparisons are done with SPR, SLP-R [7] and PRLPRW [9]. The performance metrics used for evaluating the effectiveness of the proposed solution are explained in Sec.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…At first we compare our technique with Shortest Path Routing (SPR) and then with the other similar techniques (i.e., random walkbased SLP techniques) to evaluate its performance. The comparisons are done with SPR, SLP-R [7] and PRLPRW [9]. The performance metrics used for evaluating the effectiveness of the proposed solution are explained in Sec.…”
Section: Resultsmentioning
confidence: 99%
“…Two solutions named PRBRW and PRLPRW have been proposed in [9]. The first approach sends the packets in the reverse direction followed by the greedy approach to reach the BS.…”
Section: A Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other algorithms use random walk techniques to provide SLP such as forward random walk [15] and two-level phantom routing using a second phantom node [16]. However, this class of solution has a number of weaknesses that can lead to a low level of SLP due to the reuse of routing paths and exposure of direction information [17].…”
Section: Random Walk-based Solutionsmentioning
confidence: 99%
“…( 13) break (14) case SourceToSinkAn dB ack (15) IsSilentState ⟵ SourceToSinkAndBack(SeqNo, SDB). ( 16) break (17) if IsSilentStatethen (18) pass ► Discard the received message ( 19) else (20) BCAST Normal 〈SeqNo, SDB, . .…”
Section: Impact Of Classifcationmentioning
confidence: 99%