Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Protecting source location privacy in wireless sensor networks with data aggregation
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Hi-index | 0.00 |
Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, such as in military surveillance and target tracking. In such applications, privacy of the location of the source sensor is of utmost importance as its compromise may reveal the location of the object being monitored. Traditional security mechanisms, like encryption, have proven to be ineffective as location of the source can also be revealed by analysis of the direction of traffic flow in the network. In this paper, we investigate the source-location privacy issue. We first propose a semi-global eavesdropping attack model which we show as being more realistic than the local or global eavesdropping attack model discussed in literature. In this model, we use a linear-regression based traffic analysis technique and show that it is effective in inferring the location of the data source under an existing source-location preserving technique. To measure source location privacy against this semi-global eavesdropping, we define an α-angle anonymity model. Additionally, we adapt the conventional function of data mules to design a new protocol for securing source location privacy, called the Mules-Saving-Source (MSS) protocol, which provides α-angle anonymity. We analyze the delay incurred by using data mules in our protocol and examine the association between privacy preservation and data delay in our protocol through simulation.