SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Temporal Privacy in Wireless Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Preserving source location privacy in monitoring-based wreless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
Protecting the sink location privacy in wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to the sink or source nodes. In order to defend the location privacy of the sink and source nodes, we propose a Location Privacy Support Scheme (LPSS). We prove that, with the increase in distance between sink and source node, the protection strength of the LPSS increases exponentially. Theoretical and simulation results show that LPSS can provide strong location privacy protection for both the sink and source nodes under different attacks. Under the similar delivery delay (or energy consumption), the safe time provided by LPSS is much longer than other approaches. Facilitated by the study on LPSS, we further investigate that the correlation between sink and source nodes. We find that if one source node is exposed to a sophisticated adversary, conventional fake packet injection mechanisms for protecting sink node tend to be useless.