Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks

@article{Li2009MixingRS,
  title={Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks},
  author={Yun Li and Jian Ren},
  journal={2009 Proceedings of 18th International Conference on Computer Communications and Networks},
  year={2009},
  pages={1-6}
}
Wireless sensor networks consist of low-cost and lowpower radio devices and are deployed in open and unprotected areas. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For wireless sensor networks, computationally intensive cryptographic algorithms (such as public-key… CONTINUE READING
Highly Cited
This paper has 34 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 13 extracted citations

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

IEEE Communications Surveys & Tutorials • 2013
View 4 Excerpts
Highly Influenced

Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing

2018 International Conference on Information and Communication Technology Convergence (ICTC) • 2018
View 1 Excerpt

Isolated Adversary Zone for source location privacy in Wireless Sensor Networks

2016 International Wireless Communications and Mobile Computing Conference (IWCMC) • 2016
View 2 Excerpts

Protecting source-location privacy based on multirings in wireless sensor networks

Concurrency and Computation: Practice and Experience • 2015
View 3 Excerpts

An energy-efficient routing technique for privacy preservation of assets monitored with WSN

Proceedings of the 2014 IEEE Students' Technology Symposium • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Preserving source location privacy in monitoring-based wireless sensor networks

Proceedings 20th IEEE International Parallel & Distributed Processing Symposium • 2006
View 2 Excerpts

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) • 2005

PIKE: peer intermediaries for key establishment in sensor networks

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. • 2005
View 1 Excerpt