Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Deconstructing source location privacy-aware routing protocols

Tools
- Tools
+ Tools

Jhumka, Arshad and Bradbury, Matthew S. (2017) Deconstructing source location privacy-aware routing protocols. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 431-436. ISBN 9781450344869.

[img]
Preview
PDF
WRAP-deconstructing-source-location-privacy-aware-routing-Jhumka-2017.pdf - Accepted Version - Requires a PDF viewer.

Download (1227Kb) | Preview
Official URL: https://doi.org/10.1145/3019612.3019655

Request Changes to record.

Abstract

Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol. In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.

Item Type: Conference Item (Paper)
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Computer security, Routing (Computer network management), Wireless sensor networks
Journal or Publication Title: Proceedings of the Symposium on Applied Computing
Publisher: ACM
ISBN: 9781450344869
Official Date: 3 April 2017
Dates:
DateEvent
3 April 2017Published
2 December 2016Completion
19 November 2016Accepted
10 September 2016Submitted
Page Range: pp. 431-436
Status: Peer Reviewed
Publication Status: Published
Conference Paper Type: Paper
Title of Event: 32nd ACM SIGAPP Symposium On Applied Computing
Type of Event: Conference
Location of Event: Marrakech, Morocco
Date(s) of Event: 3-7 April 2017
Related URLs:
  • Other
  • Publisher

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us