3.8 Proceedings Paper

Source Location Privacy Using Fake Source And Phantom Routing (FSAPR) Technique in Wireless Sensor Networks

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.procs.2015.07.486

Keywords

WSN Privacy; fake source; phantom routing; Location privacy; Source location privacy

Ask authors/readers for more resources

Wireless sensor networks (WSNs) consist of numbers of small nodes that can sense, collect, and disseminate information for many different types of applications. One of these applications is subject tracking and monitoring, in which the monitored subjects often need protection. For instance, a WSN can be deployed to monitor the movement of a panda in a large park. The panda needs protection from different adversaries. An adversary might trace the messages in the WSNs to find the source node that sensed the panda, with the final aim of killing the panda. Hence the question is: how do we hide the location of the source node from the adversary? In other words, the problem is to provide privacy to the source node: Providing source location privacy (SLP) is complicated by the fact that there are many factors that influence the effectiveness of a solution. The problem with most of the existing solutions is that they only provide SLP in a few specific scenarios. We propose a distributed solution for source location privacy using the Fake source and Phantom routing (FSAPR) protocol. (C) 2015 The Authrs. Published by Elsevier B.V.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available