2012
DOI: 10.1007/s00779-012-0539-9
|View full text |Cite
|
Sign up to set email alerts
|

Protecting the sink location privacy in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(29 citation statements)
references
References 23 publications
0
29
0
Order By: Relevance
“…Conjointly this can be an associate key that is tough for associate entrant to search out the key. (13) At this, we arranged a cipher which is focused on sparse product of matrix U m and based on this matrix, sparse product will be calculate. The technique comprises encryption of a typical content into cipher content Xn over a onetime key called T0.…”
Section: Extended Euclidean Algorithmmentioning
confidence: 99%
“…Conjointly this can be an associate key that is tough for associate entrant to search out the key. (13) At this, we arranged a cipher which is focused on sparse product of matrix U m and based on this matrix, sparse product will be calculate. The technique comprises encryption of a typical content into cipher content Xn over a onetime key called T0.…”
Section: Extended Euclidean Algorithmmentioning
confidence: 99%
“…Some authors also propose using intrusion detection to handle the wormhole attack, but intrusion detection is difficult to isolate the attacker in a software-only approach. In [28] presented a general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks in wireless networks. They presented two types of packet leashes: geographic leashes and temporal leashes.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…One important implied assumption behind the data collection mechanisms using mobile sinks is that the collected data must be delay-tolerant as the collection delay is bounded by the physical distances and the speed of the mobile sinks. Clearly, this whole approach would not be appropriate when we need to collect real-time data, for which new approaches need to be developed as we are currently investigating in a related work [26,29]. For monitoring applications that are able to perform their expected functionalities as long as the data transmission is done within hours or minutes, then we can consider mobile sinks.…”
Section: Related Work and Backgroundmentioning
confidence: 99%