Networking

Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks

Free registration required

Executive Summary

Communication privacy techniques that protect the locations of source sensor nodes and sink nodes from either global or local adversaries have received significant attention recently. The improvement in capture time, which is the time it takes for an adversary to identify the location of the source, is often estimated using simulations. In this paper, the authors present probabilistic models to analyze the expected capture time of source sensor nodes for recently privacy protocols against local adversary using phantom routing, and global adversary using statistically Strong Source Anonymity (SSA).

  • Format: PDF
  • Size: 190.4 KB