A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks

被引:17
作者
Bradbury, Matthew [1 ]
Jhumka, Arshad [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2017年
基金
英国工程与自然科学研究理事会;
关键词
Source Location Privacy; Wireless Sensor Networks; Optimal Routing; Integer Linear Programming;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As interest in using Wireless Sensor Networks (WSNs) for deployments in scenarios such as asset monitoring increases, the need to consider security and privacy issues also becomes greater. One such issue is that of Source Location Privacy (SLP) where the location of a source in the network needs to be kept secret from a malicious attacker. Many techniques have been proposed to provide SLP against an eavesdropping attacker. Most techniques work by first developing an algorithm followed by extensive performance validation. Differently, in this paper, we model the SLP problem as an Integer Linear Programming optimization problem. Using the IBM ILOG CPLEX optimiser, we obtain an optimal solution to provide SLP. However, that solution is centralised (i.e., requires network-wide knowledge) making the solution unsuitable for WSNs. Therefore, we develop a distributed version of the solution and evaluate the level of privacy provided by it. The solution is hybrid in nature, in that it uses both spatial and temporal redundancy to provide SLP. Results from extensive simulations using the TOSSIM WSN simulator indicate a 1% capture ratio is achievable as a trade-off for an increase in the delivery latency.
引用
收藏
页码:409 / 416
页数:8
相关论文
共 27 条
[1]  
[Anonymous], 2014, VEHICULAR TECHNOLOGY
[2]  
[Anonymous], 2017, P ACM S APPL COMPUTI
[3]  
[Anonymous], 2002, Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, WSNA'02
[4]   A survey on non-linear optimization problems in wireless sensor networks [J].
Asorey-Cacheda, R. ;
Garcia-Sanchez, A. -J. ;
Garcia-Sanchez, F. ;
Garcia-Haro, J. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 :1-20
[5]   A wireless sensor network to monitor and protect tigers in the wild [J].
Badescu, Alina-Mihaela ;
Cotofana, Lucian .
ECOLOGICAL INDICATORS, 2015, 57 :447-451
[6]  
Benenson Z, 2008, CRYPTOL INF SEC SER, V1, P22
[7]  
Boubrima A., 2017, IEEE T WIREL COMMUN, V99, P1
[8]   A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks [J].
Bradbury, Matthew ;
Leeke, Matthew ;
Jhumka, Arshad .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :531-538
[9]   Maximum lifetime routing in wireless sensor networks [J].
Chang, JH ;
Tassiulas, L .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2004, 12 (04) :609-619
[10]   Providing Source Location Privacy in Wireless Sensor Networks: A Survey [J].
Conti, Mauro ;
Willemsen, Jeroen ;
Crispo, Bruno .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1238-1280