Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Source location anonymity for sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Protecting source location privacy in wireless sensor networks with data aggregation
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Maelstrom: receiver-location preserving in wireless sensor networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
Using data mules to preserve source location privacy in wireless sensor networks
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Hi-index | 0.00 |
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, the privacy of monitored objects' locations becomes an important concern. When a sensor reports a monitored object by sending a series of messages through the sensor network, the route these messages take in theory creates a trail leading back to their source. By eavesdropping on communications, an attacker may be able to move from node to node to follow this trail. Several approaches aimed at discouraging this kind of eavesdropping have been proposed, including mechanisms for constructing "phantom" routes and approaches that insert fake sources as background noise. A problem with existing approaches is that message latencies become larger and energy costs become higher as a result of introducing protections for the privacy of a source location. This paper proposes a new cyclic entrapment method (CEM) that protects source locations in sensor networks while adding a comparatively low cost in terms of additional message latency and energy.