Publication | Closed Access
Source location privacy against laptop-class attacks in sensor networks
49
Citations
14
References
2008
Year
Unknown Venue
EngineeringInformation SecurityInformation ForensicsLocalizationMisbehaviour DetectionHardware SecurityWireless SecurityLocation AwarenessDenial-of-service AttackPrivacy-preserving CommunicationInternet Of ThingsNetwork TrafficSource Location PrivacyNetwork SecurityData PrivacyComputer ScienceMobile ComputingSource LocationData SecurityCryptography
Sensor networks may be used in many monitoring applications where the locations of the monitored objects are quite sensitive and need to be protected. Previous research mainly focuses on protecting source location against mote-class attackers who only have a local view of the network traffic. In this paper, we focus on how to protect the source location against laptop-class attackers who have a global view of the network traffic. This paper proposes four schemes---naive, global, greedy, and probabilistic---to deal with laptop-class attacks. The naive solution uses maintenance messages sent periodically to hide real event reports. The global and greedy solutions improve the naive solution by reducing the latency of event delivery without increasing communication overhead. The probabilistic solution further improves the performance by reducing communication overhead without sacrificing location privacy. Experiments show that the probabilistic solution is practical for providing source location privacy against a laptop-class attacker.
| Year | Citations | |
|---|---|---|
Page 1
Page 1