Traffic Analysis Attack for Identifying Users’ Online Activities

2019 ◽  
Vol 21 (2) ◽  
pp. 50-57
Author(s):  
Firdous Kausar ◽  
Sarah Aljumah ◽  
Shorouq Alzaydi ◽  
Raghad Alroba
2018 ◽  
Vol 78 (21) ◽  
pp. 29731-29745
Author(s):  
Alejandra Guadalupe Silva Trujillo ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba ◽  
Tai-Hoon Kim

Author(s):  
Chitra Rajarama ◽  
Jagadeesha Narasimhamurthy Sugatoor ◽  
Yerri Swamy T

<span>A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.</span>


Author(s):  
Chitra Rajarama ◽  
Jagadeesha Narasimhamurthy Sugatoor ◽  
Yerri Swamy T

A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.


Author(s):  
Yaodan Hu ◽  
Xuanheng Li ◽  
Jianqing Liu ◽  
Haichuan Ding ◽  
Yanmin Gong ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document