Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Lightweight probabilistic broadcast
ACM Transactions on Computer Systems (TOCS)
On Providing Anonymity in Wireless Sensor Networks
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
Castalia: revealing pitfalls in designing distributed algorithms in WSN
Proceedings of the 5th international conference on Embedded networked sensor systems
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Source location anonymity for sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Preserving source location privacy in monitoring-based wreless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Hi-index | 0.00 |
Wireless sensor technology may be envisioned as the promising substitute of traditional collaborative distributed schemes, especially for monitoring applications. However, the widespread adoption of such technology is being slowed down because of growing security concerns, specially critical in stationary sensor topologies which create new threats to the privacy of individuals and organizations. As a countermeasure against source observability and traceability, several source-location privacy solutions have been presented so far. The goal of this paper is twofold. We present an experimental comparison of the energy consumption of existing strategies (i.e. Flooding, Phantom and Fake Routing) as well as proposing a novel energy-aware approach aimed at disguising the real source in the presence of a global eavesdropper. A major finding of this preliminary work is that source anonymity is reached with minimum consumption.