Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Rumor routing algorthim for sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Trajectory based forwarding and its applications
Proceedings of the 9th annual international conference on Mobile computing and networking
Flooding strategy for target discovery in wireless networks
MSWIM '03 Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems
Parametric probabilistic sensor network routing
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Lightweight probabilistic broadcast
ACM Transactions on Computer Systems (TOCS)
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Flooding in wireless ad hoc networks
Computer Communications
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Proceedings of the 4th ACM workshop on Wireless security
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
IEEE Pervasive Computing
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Coordinating randomized policies for increasing security of agent systems
Information Technology and Management
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Source location anonymity for sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure and private search protocols for RFID systems
Information Systems Frontiers
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Preserving source location privacy in monitoring-based wreless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Protecting source location privacy in wireless sensor networks with data aggregation
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Location privacy and resilience in wireless sensor networks querying
Computer Communications
An experimental comparison of source location privacy methods for power optimization in WSNs
SENSIG '10/MATERIALS'10 Proceedings of the 3rd WSEAS international conference on Advances in sensors, signals and materials
Event handoff unobservability in WSN
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Attack detection vs. privacy --- how to find the link or how to hide it?
SP'11 Proceedings of the 19th international conference on Security Protocols
Using data mules to preserve source location privacy in wireless sensor networks
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Towards statistically strong source anonymity for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is confidentiality of the source sensor's location. In this paper, we focus on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication. In particular, we focus on the class of flooding protocols. While developing and evaluating our privacy-aware routing protocols, we jointly consider issues of location-privacy as well as the amount of energy consumed by the sensor network. Motivated by the observations, we propose a flexible routing strategy, known as phantom routing, which protects the source's location. Phantom routing is a two-stage routing scheme that first consists of a directed walk along a random direction, followed by routing from the phantom source to the sink. Our investigations have shown that phantom routing is a powerful technique for protecting the location of the source during sensor transmissions.