An Enhanced Communication Protocol for Anonymity and Location Privacy in WSN

被引:0
作者
Abuzneid, Abdel-shakour [1 ]
Sobh, Tarek [1 ]
Faezipour, Miad [1 ]
机构
[1] Univ Bridgeport, Bridgeport, CT 06604 USA
来源
2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW) | 2015年
关键词
WSN; anonymity; privacy; source location privacy; sink privacy; contextual privacy; WIRELESS; INTERNET;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a phenomenon and represent it in a form of data. There are many applications for WSNs such as object tracking and monitoring where the objects need protection. Providing an efficient location privacy solution would be challenging to achieve due to the exposed nature of the WSN. The communication protocol needs to provide location privacy measured by anonymity, observability, capture-likelihood and safety period. We extend this work to allow for countermeasures against semi-global and global adversaries. We present a network model that is protected against a sophisticated passive and active attacks using local, semi-global, and global adversaries.
引用
收藏
页码:91 / 96
页数:6
相关论文
共 12 条
[1]   An efficient anonymous communication protocol for wireless sensor networks [J].
Chen, Juan ;
Du, Xiaojiang ;
Fang, Binxing .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (14) :1302-1312
[2]   Providing Source Location Privacy in Wireless Sensor Networks: A Survey [J].
Conti, Mauro ;
Willemsen, Jeroen ;
Crispo, Bruno .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1238-1280
[3]  
Jang-Ping S., ANONYMOUS PATH ROUTI, P2728
[4]   Security of the Internet of Things: perspectives and challenges [J].
Jing, Qi ;
Vasilakos, Athanasios V. ;
Wan, Jiafu ;
Lu, Jingwei ;
Qiu, Dechao .
WIRELESS NETWORKS, 2014, 20 (08) :2481-2501
[5]  
Juan C., EFFICIENT ANONYMOUS, P1
[6]   Location privacy and anonymity preserving routing for wireless sensor networks [J].
Nezhad, Alireza A. ;
Miri, Ali ;
Makrakis, Dimitris .
COMPUTER NETWORKS, 2008, 52 (18) :3433-3452
[7]  
Song H., 2007, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, P242, DOI DOI 10.1145/1280940.1280993
[8]  
Xue S. M. a. G., 2006, INT J SENSOR NETWORK, V1
[9]   A survey on trust management for Internet of Things [J].
Yan, Zheng ;
Zhang, Peng ;
Vasilakos, Athanasios V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :120-134
[10]   Protecting the sink location privacy in wireless sensor networks [J].
Yao, Lin ;
Kang, Lin ;
Shang, Pengfei ;
Wu, Guowei .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) :883-893