Protecting the sink location privacy in wireless sensor networks

被引:25
作者
Yao, Lin [1 ]
Kang, Lin [1 ]
Shang, Pengfei [1 ]
Wu, Guowei [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
基金
中国国家自然科学基金;
关键词
Location privacy; Receiver; Sink; WSN;
D O I
10.1007/s00779-012-0539-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. Therefore, location privacy, particularly the location privacy of the sink node, requires ultimate protection because of its critical position in WSNs. In this paper, we propose a sink location privacy protection scheme by injecting fake packets, but every real packet is still routed along its shortest path. The fake packets are routed to some random destinations and some fake sinks in order to provide the path diversity. It is difficult for an attacker to distinguish the real packets from the fake packets. Thus, the chance of finding the real sink by packet-tracing attack is reduced. Privacy analysis shows that the sink location privacy can be protected better with higher successful probability. We examine the packet travel delay, safe time, and energy consumption by both mathematical analysis and simulations.
引用
收藏
页码:883 / 893
页数:11
相关论文
共 29 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2010, J CONVERGENCE SECURI
[3]  
[Anonymous], NS MANUAL
[4]  
BISWAS S, 2007, P IEEE C COMP VIS PA, P1, DOI DOI 10.1109/CVPR.2007.383292
[5]  
CHEN HL, 2010, IEEE IPCCC, P1, DOI DOI 10.1109/PCCC.2010.5682341
[6]   A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks [J].
Chow, Chi-Yin ;
Mokbel, Mohamed F. ;
He, Tian .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (01) :94-107
[7]   Countermeasures against traffic analysis attacks in wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :113-124
[8]  
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[9]   Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks [J].
Deng, Jing ;
Han, Richard ;
Mishra, Shivakant .
PERVASIVE AND MOBILE COMPUTING, 2006, 2 (02) :159-186
[10]  
Edith C., 2009, INT C WIRELESS COMMU, P269, DOI DOI 10.1145/1582379.1582439