Cluster Based Location Privacy in Wireless Sensor Networks Against a Universal Adversary

被引:0
作者
George, Chinnu Mary [1 ]
Kumar, Manoj [1 ]
机构
[1] Karunya Univ, Dept Informat Technol, Coimbatore, Tamil Nadu, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
Wireless Sensor Networks; Clustering; Privacy; location privacy; Eavesdropper;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even though a lot security is given in the wireless sensor networks yet the information is being exposed. Such information can then used by the adversary for the attack. The existing privacy techniques defend against a local adversary. There are two main categories of privacy preservation in Wireless Sensor Networks. They are data privacy and the context privacy. In this paper, we describe Location privacy. Location privacy is extremely important in Wireless Sensor Networks. Information on location of events or on location of base stations can be of a primary concern of adversary. location privacy is very important in hostile environments. It is sufficient for the adversary to find out location of sensors currently monitoring the location of the source to successfully localize and capture the source. Similarly, the adversary only needs to find out location of the base station to be able to mount a physical or other DoS attack on the base station and thus inactivate the whole network. In this paper, they are two main categories of privacy preserving techniques for Wireless sensor network that have been presented, data-oriented and context-oriented. So different techniques against a universal adversary with respect to context privacy are discussed. The paper presents recurrent clustering mechanism.
引用
收藏
页码:288 / 293
页数:6
相关论文
共 12 条
[1]  
Agrawal Rakesh, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[2]  
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[3]   Protecting receiver-location privacy in wireless sensor networks [J].
Jian, Ying ;
Chen, Shigang ;
Zhang, Zhan ;
Zhang, Liang .
INFOCOM 2007, VOLS 1-5, 2007, :1955-+
[4]   Privacy preservation in wireless sensor networks: A state-of-the-art survey [J].
Li, Na ;
Zhang, Nan ;
Das, Sajal K. ;
Thuraisingham, Bhavani .
AD HOC NETWORKS, 2009, 7 (08) :1501-1514
[5]  
Mehta K., 2007, IEEE INT C NETW PROT, P31
[6]  
Ouyang Yi., 2006, Proc. of the 2006 International Symposium on on World of Wireless, P23
[7]  
Ozturk C., 2004, P 2 ACM WORKSH SEC A, DOI [10.1145/1029102.1029117, DOI 10.1145/1029102.1029117]
[8]  
Ozturk C., 2004, P 2 ACM WORKSH SEC A
[9]  
Raymond J.-F., 2001, Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings (Lecture Notes in Computer Science Vol.2009), P10
[10]  
SOHRABY K, 2007, WIRELESS SENSOR NETW, P10