Techniques for Protecting Location Privacy of Source and Sink Node Against Global Adversaries in Sensor Network
Abstract
The exposed environment of a sensor network makes relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the source and destination physically.
Keywords
intervallic gathering, source imitation, sink imitation, location privacy
Full Text:
PDFCopyright (c) 2014 Pavitha N, S. N. Shelke
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org