2016 IEEE International Conference on Communication Systems (ICCS) 2016
DOI: 10.1109/iccs.2016.7833572
|View full text |Cite
|
Sign up to set email alerts
|

Towards fake sources for source location privacy in wireless sensor networks with multiple sources

Abstract: Copies of full items can be used for personal research or study, educational, or not-for profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way.Publisher's statement: © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Strength of an adversary can be factored along two dimensions: presence and actions [ 1 , 3 ]. Presence is concerned with network coverage of the adversary while action is concerned with type of attacks it can launch.…”
Section: Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Strength of an adversary can be factored along two dimensions: presence and actions [ 1 , 3 ]. Presence is concerned with network coverage of the adversary while action is concerned with type of attacks it can launch.…”
Section: Modelsmentioning
confidence: 99%
“…The use of Wireless Sensor Networks (WSNs) in monitoring applications can vary from safety-critical monitoring applications such as monitoring of high value assets, the military, healthcare and radiation monitoring, to non-critical applications such as temperature and humidity control [ 1 ]. In safety-critical monitoring applications, it is extremely important to ensure that transmission of data between the sensor nodes is secure and information such as location of the asset being monitored is kept private [ 2 , 3 ]. WSNs operate in broadcast mode and packets are routed from the source node to sink node through multi-hop communication.…”
Section: Introductionmentioning
confidence: 99%
“…The adopted adversary model may be considered relatively weak compared to other powerful adversary models as highlighted in [16]. Nonetheless, the proposed model is preferred since some of the more powerful models include behaviors that are unlikely for the adversary to perform, as it will affect its ability to get further information from the network.…”
Section: Modelsmentioning
confidence: 99%
“…If the safety period is exceeded, it is possible that the asset will have moved to a different location. A set of actions that a more powerful adversary can perform but with limited benefits to the adversary are expressed in [16] in the following order: …”
Section: Modelsmentioning
confidence: 99%
See 1 more Smart Citation