Techniques for Protecting Location Privacy of Source and Sink Node Against Global Adversaries in Sensor Network

Pavitha N, S. N. Shelke


The exposed environment of a sensor network makes relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the source and destination physically.


intervallic gathering, source imitation, sink imitation, location privacy

Full Text:


Copyright (c) 2014 Pavitha N, S. N. Shelke

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: