GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Using mobile relays to prolong the lifetime of wireless sensor networks
Proceedings of the 11th annual international conference on Mobile computing and networking
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Controllably Mobile Infrastructure for Low Energy Embedded Networks
IEEE Transactions on Mobile Computing
Data harvesting with mobile elements in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Mobile Element Scheduling with Dynamic Deadlines
IEEE Transactions on Mobile Computing
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Energy efficient routing with delay guarantee for sensor networks
Wireless Networks
Rendezvous Planning in Mobility-Assisted Wireless Sensor Networks
RTSS '07 Proceedings of the 28th IEEE International Real-Time Systems Symposium
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Multiple controlled mobile elements (data mules) for data collection in sensor networks
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Protecting the sink location privacy in wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common practice of sensor networks is to collect data from the sensors and report the data to the sinks or to some pre-defined data rendezvous points via multi-hop communications. Attackers may locate a sink easily by reading the destination field in the packet header or predicting the arrival of a sink at the rendezvous points, which opens up vulnerabilities to location privacy of the sinks. In this work, we propose a random data collection scheme to protect the location privacy of mobile sinks in sensor networks. Data are forwarded along some random paths and stored at random nodes in the network. The sinks move around along some random paths to collect data from the local nodes occasionally, which prevents the attackers from predicting their locations and movements. We analyze different attacks threatening the location privacy of the sinks in sensor networks. We also evaluate the delivery rate, data collection delay and protection strength of our scheme by both analysis and simulations. The results show that our scheme can provide location privacy of mobile sinks effectively, while providing satisfactory data collection services.