Routing-based source-location privacy protection in wireless sensor networks

  title={Routing-based source-location privacy protection in wireless sensor networks},
  author={Yun Li and Leron Lightfoot and Jian Ren},
  journal={2009 IEEE International Conference on Electro/Information Technology},
Wireless sensor networks (WSN) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the… CONTINUE READING
Highly Cited
This paper has 26 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 17 extracted citations

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

IEEE Communications Surveys & Tutorials • 2013
View 14 Excerpts
Highly Influenced

Isolated Adversary Zone for source location privacy in Wireless Sensor Networks

2016 International Wireless Communications and Mobile Computing Conference (IWCMC) • 2016
View 2 Excerpts

Protecting source-location privacy based on multirings in wireless sensor networks

Concurrency and Computation: Practice and Experience • 2015
View 3 Excerpts

R-STaR destination-location privacy schemes in wireless sensor networks

2015 IEEE International Conference on Communications (ICC) • 2015
View 2 Excerpts


Publications referenced by this paper.
Showing 1-10 of 24 references

Routing-Based Source-Location Privacy in Wireless Sensor Networks

2009 IEEE International Conference on Communications • 2009
View 9 Excerpts

Preserving source location privacy in monitoring-based wireless sensor networks

Proceedings 20th IEEE International Parallel & Distributed Processing Symposium • 2006
View 2 Excerpts

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) • 2005

PIKE: peer intermediaries for key establishment in sensor networks

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. • 2005
View 1 Excerpt

Similar Papers

Loading similar papers…