The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Temporal Privacy in Wireless Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Hi-index | 0.00 |
For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficult and expensive to achieve. This is not only because adversaries may attack against sensor source privacy through traffic analysis, but also because sensor networks are very limited in resources. As such, a practical trade-off between security and performance is desirable. In this article, for the first time we propose the notion of statistically strong source anonymity, under a challenging attack model where a global attacker is able to monitor the traffic in the entire network. We propose a scheme called FitProbRate, which realizes statistically strong source anonymity for sensor networks. We demonstrate the robustness of our scheme under various statistical tests that might be employed by the attacker to detect real events. Our analysis and simulation results show that our scheme, besides providing source anonymity, can significantly reduce real event reporting latency compared to two baseline schemes. However, the degree of source anonymity in the FitProbRate scheme might decrease as real message rate increases. We propose a dynamic mean scheme which has better performance under high real message rates. Simulation results show that the dynamic mean scheme is capable of increasing the attacker's false positive rate and decreasing the attacker's Bayesian detection rate significantly even under high-rate continuous real messages.