Privacy-aware routing in sensor networks

被引:71
作者
Wang, Haodong [1 ]
Sheng, Bo [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
基金
美国国家科学基金会;
关键词
Sensor networks; Location privacy; Security; Traceback;
D O I
10.1016/j.comnet.2009.02.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is periodically sent back to the sink. Many times, the object needs to be protected for security reasons. However, an adversary can detect message flows and trace the message back to its source by moving in the reverse direction of the flows. This paper aims to maximize source location privacy, which is evaluated by the adversary's traceback time, by designing routing protocols that distribute message flows to different routes. First, we give the performance bound for any routing scheme. Then, we present our routing schemes, which maximize the adversary's average traceback time and achieve max-min traceback time given certain energy constraints. We then propose WRS, a suboptimal but practical privacy-aware routing scheme, and provide simulation results. Finally, we extend the discussion to an extreme adversary model, which allows the adversary to deploy an adversary sensor network to monitor the message routing activities. Accordingly, we propose a random schedule scheme to confuse the adversary. To reduce the message delivery time, we give an approximation algorithm for message routing. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1512 / 1529
页数:18
相关论文
共 35 条
[1]  
ALMUHTADI J, 2002, ROUTING MIST PRIVACY, P65
[2]  
ANDERSEN R, 2004, INFOCOM
[3]  
[Anonymous], MOBICOM
[4]  
BHANDARI RAMESH., 1997, ISCC
[5]  
CHAN H., 2005, INFOCOM
[6]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[7]  
Deng J, 2003, LECT NOTES COMPUT SC, V2634, P349
[8]  
Du W., 2003, ACM CCS
[9]  
Eschenauer L., 2002, ACM CCS
[10]   On flow marking attacks in wireless anonymous communication networks [J].
Fu, XW ;
Zhu, Y ;
Graham, B ;
Bettati, R ;
Zhao, W .
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, :493-503