Privacy-aware routing in sensor networks

被引:66
|
作者
Wang, Haodong [1 ]
Sheng, Bo [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
基金
美国国家科学基金会;
关键词
Sensor networks; Location privacy; Security; Traceback;
D O I
10.1016/j.comnet.2009.02.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is periodically sent back to the sink. Many times, the object needs to be protected for security reasons. However, an adversary can detect message flows and trace the message back to its source by moving in the reverse direction of the flows. This paper aims to maximize source location privacy, which is evaluated by the adversary's traceback time, by designing routing protocols that distribute message flows to different routes. First, we give the performance bound for any routing scheme. Then, we present our routing schemes, which maximize the adversary's average traceback time and achieve max-min traceback time given certain energy constraints. We then propose WRS, a suboptimal but practical privacy-aware routing scheme, and provide simulation results. Finally, we extend the discussion to an extreme adversary model, which allows the adversary to deploy an adversary sensor network to monitor the message routing activities. Accordingly, we propose a random schedule scheme to confuse the adversary. To reduce the message delivery time, we give an approximation algorithm for message routing. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1512 / 1529
页数:18
相关论文
共 50 条
  • [1] Privacy-Aware Ant Routing for Wireless Multimedia Sensor Networks in Healthcare
    Saleh, Yasmine N. M.
    Chibelushi, Claude C.
    Abdel-Hamid, Ayman A.
    Soliman, Abdel-Hamid
    [J]. 2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [2] An Efficient Privacy-Aware Routing Scheme Against Eavesdroppers in Wireless Sensor Networks
    Zhou, Liming
    Wen, Qiaoyan
    Zhang, Hua
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 63 - 68
  • [4] Requirements and Challenges in the Design of Privacy-aware Sensor Networks
    Aivaloglou, Efthimia
    Gritzalis, Stefanos
    Skianis, Charalabos
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [5] A Probabilistic Model for Lifetime Measurement in Privacy-Aware Sensor Networks
    Sun, Xice
    Wang, Zhi
    Chen, Honglong
    Lou, Wei
    [J]. 2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 414 - +
  • [6] Privacy-Aware Routing Approach for Mobile Applications
    Aleksy, Markus
    Butter, Thomas
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 632 - 637
  • [7] A privacy-aware overlay routing scheme in WSNs
    Kazatzopoulos, L.
    Delakouridis, K.
    Marias, G. F.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (07) : 729 - 743
  • [8] PARTS - Privacy-Aware Routing with Transportation Subgraphs
    Roth, Christian
    Hartmann, Lukas
    Kesdogan, Dogan
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 86 - 101
  • [9] Privacy-Aware Probabilistic Sampling for Data Collection in Wireless Sensor Networks
    Guerreiro, Joao
    Ngai, Edith C. -H.
    Rohner, Christian
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 314 - 319
  • [10] A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
    Hui Lin
    Jia Hu
    Jianfeng Ma
    Li Xu
    Atulya Nagar
    [J]. Wireless Personal Communications, 2014, 75 : 1611 - 1633