Research Article

Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes

Figure 1

SLP technique attacker movement patterns [13]. The red line starting from the sink node presents the movement of an attacker. The wavy lines denote the messages flooding. In (a) and (b) the attacker zigzags between phantom nodes and fake sources, respectively. The attacker is slowed down on his path to find the source as messages are delayed in transmission shown in (c). In (d), the attacker has to find a long route to catch the source as some nodes (grey color nodes) are in the silent state. (a) Phantom routing. (b) Fake sources. (c) Message delay. (d) Silent nodes.
(a)
(b)
(c)
(d)