2015 International Conference on Computing, Networking and Communications (ICNC) 2015
DOI: 10.1109/iccnc.2015.7069511
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication scheme for wireless sensor networks to maintain anonymity

Abstract: In wireless sensor networks it is becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to conceal their identities either being a base station or being a source node. Anonymous communication in wireless sensor networks includes numerous important aspects, for instance base station anonymity, communication association anonymity, and source node anonymity. Fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Anonymity in WSNs means preventing a third party other than the message sender and receiver from knowing the identity of the two primary parties in communication. This includes the sender anonymity, receiver anonymity, and unlinkability between the sender and receiver [26]. Thus, the anonymity of the sensor node is as important as the user anonymity.…”
Section: ) No Sensor Node Anonymitymentioning
confidence: 99%
“…Anonymity in WSNs means preventing a third party other than the message sender and receiver from knowing the identity of the two primary parties in communication. This includes the sender anonymity, receiver anonymity, and unlinkability between the sender and receiver [26]. Thus, the anonymity of the sensor node is as important as the user anonymity.…”
Section: ) No Sensor Node Anonymitymentioning
confidence: 99%
“…However, nodes A and C know nothing about each other. When nodes A and C can interact directly, we call this self-healing process [21].…”
Section: Anonymous Route Self-healing Processmentioning
confidence: 99%
“…In Table 3, we give detailed analysis of anonymity in the proposed protocol and the existing protocols. We infer from Table 3 that APR only implements communication association anonymity, RandomWalk only implements destination nodes anonymity [21,22]. However, our proposed protocol FarpScusn has achieved all three types of anonymity simultaneously.…”
Section: Anonymitymentioning
confidence: 99%
“…SLP keeps the originator sensor node untraceable and unlinkable. Untraceability means that the adversary is unable to trace back the origin node, whereas unlinkability means that the adversary cannot gain the identity of the source [21]. In SLP, the real event (of an asset) mostly has three parameters: event type, event time and, event location [22].…”
Section: Introductionmentioning
confidence: 99%