Preserving receiver-location privacy against traffic analysis attacks in wireless sensor networks

被引:0
作者
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications
来源
Zhou, L. (zhouliming1985@gmail.com) | 1600年 / Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States卷 / 09期
关键词
Fake sink; Location privacy; Traffic analysis; Wireless sensor networks;
D O I
10.12733/jcis8987
中图分类号
学科分类号
摘要
Wireless sensor networks are widely used in our daily life. It consists of various sensors which collect different information containing the identity, status, and location of an object or any other business, social or privately relevant information. But we pay attention to some issues related to sensor's location privacy. In this paper, we focus on protecting the sensor's location by introducing suitable modifications to sensor routing to make it difficult for an eavesdropper to find the original location. And we propose a Multiple Sink Interference Areas scheme, which is a flexible routing strategy to protect the sensor's location. Our strategy can efficiently reduce the chance of packets being detected. And the adversary can find it difficult to find the exact location of the source node or the base station. Copyright © 2013 Binary Information Press.
引用
收藏
页码:10113 / 10122
页数:9
相关论文
共 16 条
[1]  
Yong X., Schwiebert L., Weisong S., Preserving source location privacy in monitoring-based wireless sensor networks, IPDPS 2006: Proceedings of the 20th International Parallel and Distributed Processing Symposium, (2006)
[2]  
Rios R., Lopez J., Analysis of location privacy solutions in wireless sensor networks, IET Commun, 5, pp. 2518-2532, (2011)
[3]  
Pai S., Bermudez S., Wicker S., Et al., Transactional confidentiality in sensor networks, IEEE Security and Privacy, 6, pp. 28-35, (2008)
[4]  
Saponas T.S., Lester J., Hartung C., Agarwal S., Kohno T., Devices that tell on you: Privacy trends in consumer ubiquitous computing, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (2007)
[5]  
Srinivasan V., Stankovic J., Whitehouse K., Protecting your daily in-home activity information from a wireless snooping attack, UbiComp'08: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 202-211, (2008)
[6]  
Kamat P., Zhang Y.Y., Trappe W., Ozturk C., Enhancing source-location privacy in sensor network routing, ICDCS 2005: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 599-608, (2005)
[7]  
Karp B., Kung H.T., GPSR: Greedy perimeter stateless routing for wireless networks, Mobi-Com'00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, (2000)
[8]  
Zhang Y., Liu W., Lou W., Fang Y., MASK: Anonymous on-demand routing in mobile ad hoc networks, IEEE Transactions on Wireless Communications, 5, pp. 2376-2385, (2006)
[9]  
Fu X., Zhu Y., Graham B., Bettati R., Zhao W., On flow marking attacks in wireless anonymous communication networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 493-503, (2005)
[10]  
Ozturk C., Zhang Y.Y., Trappe W., Source-location privacy in energy-constrained sensor network routing, SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88-93, (2004)