Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = SLP, context security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 2889 KiB  
Review
Source Anonymity against Global Adversary in WSNs Using Dummy Packet Injections: A Survey
by Anas Bushnag, Abdelshakour Abuzneid and Ausif Mahmood
Electronics 2018, 7(10), 250; https://doi.org/10.3390/electronics7100250 - 13 Oct 2018
Cited by 8 | Viewed by 3281
Abstract
Source anonymity in wireless sensor networks (WSNs) becomes a real concern in several applications such as tracking and monitoring. A global adversary that has sophisticated resources, high computation and full view of the network is an obvious threat to such applications. The network [...] Read more.
Source anonymity in wireless sensor networks (WSNs) becomes a real concern in several applications such as tracking and monitoring. A global adversary that has sophisticated resources, high computation and full view of the network is an obvious threat to such applications. The network and applications need to be protected and secured to provide the expected outcome. Source anonymity is one of the fundamental WSNs security issues. It is all about preventing the adversary from reaching the origin by analyzing the traffic of the network. There are many methods to provide source anonymity, which is also known as Source Location Privacy (SLP). One of these methods is based on dummy packets. The basic notion is to inject the network with dummy packets to confuse the adversary about the location of the transmitting source node. This paper provides a survey of protocols for anonymity that use dummy packet injections. We discuss each technique from the point of their advantages and disadvantages. Further, We provide a comparison for the most promising techniques provided in the literature which use dummy packet injections. A comparison for the adversary assumptions and capabilities will be provided as well. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

Back to TopTop