2016
DOI: 10.3390/s16070957
|View full text |Cite
|
Sign up to set email alerts
|

Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

Abstract: Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…The fake source packet routing strategy has been adopted in many existing protocols including the dummy packet injection scheme [12], the dynamic fake sources-based algorithm [16], and the hybrid online dynamic single path routing algorithm [18]. Similarly, the fake source packet routing strategy is adopted in the forward random walk and bidirectional tree schemes [29], the fake network traffic-based scheme [30], the timed efficient source privacy preservation scheme [31], and the dummy uniform distribution, dummy adaptive distribution, and controlled dummy adaptive distribution protocols [32]. Often, the fake source packet routing protocols are criticized because of their high energy consumption, mainly because they rely on injecting a large number of fake packets to effectively protect the SLP.…”
Section: Related Workmentioning
confidence: 99%
“…The fake source packet routing strategy has been adopted in many existing protocols including the dummy packet injection scheme [12], the dynamic fake sources-based algorithm [16], and the hybrid online dynamic single path routing algorithm [18]. Similarly, the fake source packet routing strategy is adopted in the forward random walk and bidirectional tree schemes [29], the fake network traffic-based scheme [30], the timed efficient source privacy preservation scheme [31], and the dummy uniform distribution, dummy adaptive distribution, and controlled dummy adaptive distribution protocols [32]. Often, the fake source packet routing protocols are criticized because of their high energy consumption, mainly because they rely on injecting a large number of fake packets to effectively protect the SLP.…”
Section: Related Workmentioning
confidence: 99%
“…DUD [55,56] divides the time into intervals that have the exact duration, and it uses the same transmission rate for both real and dummy packets. A random number is thrown between 0 and 1.…”
Section: Dummy Uniform Distribution (Dud)mentioning
confidence: 99%
“…It is solved by increasing the transmitting rate, but this causes higher overhead as the network transmits more dummy packets. This relationship is considered as a trade-off between overhead and latency [55,56].…”
Section: Dummy Uniform Distribution (Dud)mentioning
confidence: 99%
See 1 more Smart Citation
“…In global-adversary-based schemes, the adversaries can monitor all the traffic of the entire network and all the collected information can be used to analyze the source locations of the packages [7]. In this case, the best choice to defend against adversaries is sending dummy packages to confuse the adversaries and most of the existing approaches attempt to identify a good balance between the security of the source node, the overhead of dummy packages, the package delivery delay, and the quality of service.…”
Section: Related Workmentioning
confidence: 99%