Enhancing source-location privacy in sensor network routing

被引:254
|
作者
Kamat, P [1 ]
Zhang, YY [1 ]
Trappe, W [1 ]
Ozturk, C [1 ]
机构
[1] Rutgers State Univ, Wireless Informat Network Lab WINLAB, Piscataway, NJ 08854 USA
关键词
D O I
10.1109/ICDCS.2005.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy. Adversaries may use RF localization techniques to perform hop-by-hop traceback to the source sensor's location. This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols. We examine two popular classes of routing protocols: the class of flooding protocols, and the class of routing protocols involving only a single path from the source to the sink. While investigating the privacy performance of routing protocols, we considered the tradeoffs between location-privacy and energy consumption. We found that most of the current protocols cannot provide efficient source-location privacy while maintaining desirable system performance. In order to provide efficient and private sensor communications, we devised new techniques to enhance source-location privacy that augment these routing protocols. One of our strategies, a technique we have called phantom routing, has proven flexible and capable of protecting the source's location, while not incurring a noticeable increase in energy overhead. Further, we examined the effect of source mobility on location privacy. We showed that, even with the natural privacy amplification resulting from source mobility, our phantom routing techniques yield improved source-location privacy relative to other routing methods.
引用
收藏
页码:599 / 608
页数:10
相关论文
共 50 条
  • [41] A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources
    Berdibek, Asset
    Saginbekov, Sain
    [J]. Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 93 - 99
  • [42] Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks
    Tan, Guangbao
    Li, Wei
    Song, Jie
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 279 - 289
  • [43] Random Selection False Source-Based Algorithm for Protecting Source-Location Privacy in WSNs
    Bai, Leqiang
    Li, Ling
    Qian, Shiguang
    Zhang, Shihong
    [J]. 2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 2064 - 2069
  • [44] Cluster based Anonymization for Source Location Privacy in Wireless Sensor Network
    Gurjar, Aparna
    Patil, A. R. Bhagat
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 248 - 251
  • [45] Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
    Mutalemwa, Lilian C.
    Shin, Seokjoo
    [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1283 - 1285
  • [46] Source Location Privacy Using Fake Source And Phantom Routing (FSAPR) Technique in Wireless Sensor Networks
    Roy, Pradeep Kumar
    Singh, Jyoti Prakash
    Kumar, Prabhat
    Singh, M. P.
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 936 - 941
  • [47] Intelligent Silent Zone for Source-Location Privacy Based on Context-Awareness in WSNs
    Zhou Qian
    Qin Xiaolin
    Ding Youwei
    [J]. Transactions of Nanjing University of Aeronautics and Astronautics, 2018, 35 (01) : 203 - 218
  • [48] Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
    Mutalemwa, Lilian C.
    Shin, Seokjoo
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 1188 - 1191
  • [49] Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks
    Long, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    [J]. IEEE ACCESS, 2014, 2 : 633 - 651
  • [50] A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
    Mahmoud, Mohamed M. E. A.
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (10) : 1805 - 1818