PASSIVE RFID-SUPPORTED SOURCE LOCATION PRIVACY PRESERVATION AGAINST GLOBAL EAVESDROPPERS IN WSN

被引:0
|
作者
Xiao, Wuchen [1 ]
Zhang, Hua [1 ]
Wen, Qiaoyan [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
来源
2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT) | 2013年
关键词
Wireless sensor network; Source location privacy; Passive RFID; Fake source; WIRELESS SENSOR NETWORKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Source location privacy is one of the most challenging issues in WSN applications. Some of existing solutions defend the leakage of location information from a limited local adversary who can only observe network traffic in small region, while the global adversary can monitor the entire network traffic. Meanwhile, most of the previous works ignore the categories of RFID. In this paper, we propose a scheme named General Fake Source (GFS) against a global adversary. It supports the passive RFID, which has no battery, cannot send a signal actively. Through simulations, we show that GFS well unifies the behavior of real and fake data sources and provides trade-offs between privacy and energy consume for source location privacy in WSN.
引用
收藏
页码:289 / 293
页数:5
相关论文
共 20 条
  • [1] Analysis of Location Monitoring Techniques with Privacy Preservation in WSN
    Dhawale, Shrikant P.
    Raut, Archana R.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 649 - 653
  • [2] A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
    Shukla, Anurag
    Singh, Deepak
    Sajwan, Mohit
    Verma, Abhishek
    Kumar, Ajit
    WIRELESS NETWORKS, 2022, 28 (02) : 827 - 852
  • [3] A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
    Anurag Shukla
    Deepak Singh
    Mohit Sajwan
    Abhishek Verma
    Ajit Kumar
    Wireless Networks, 2022, 28 : 827 - 852
  • [4] Source Location Privacy using Multiple-Phantom Nodes in WSN
    Kumar, Prabhat
    Singh, J. P.
    Vishnoi, Prateek
    Singh, M. P.
    TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [5] A source-location privacy protocol in WSN based on locational angle
    Wang Wei-Ping
    Chen Liang
    Wang Jian-Xin
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1630 - 1634
  • [6] Preserving Source Location Privacy against the Global Attacker Hiding in FOG
    Zhou, Qian
    Qin, Xiaolin
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2018,
  • [7] Privacy Preservation of Source Location Using Phantom Nodes
    Gupta, Shruti
    Kumar, Prabhat
    Singh, J. P.
    Singh, M. P.
    INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 247 - 256
  • [8] A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs
    Manjula, R.
    Datta, Raja
    PERVASIVE AND MOBILE COMPUTING, 2018, 44 : 58 - 73
  • [9] A Source Location Privacy Preservation Method Using Mixed Fake Sources and Phantoms
    Hong, Zhen
    Chen, Wentao
    Li, Taotao
    Su, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 4971 - 4980
  • [10] Source location privacy preservation in IoT-enabled event-driven WSNs
    Sharma, Nidhi
    Bhatt, Ravindara
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (05) : 782 - 798