A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding

被引:24
|
作者
Chen J. [1 ]
Fang B.-X. [1 ,2 ]
Yin L.-H. [2 ]
Su S. [1 ]
机构
[1] Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology
[2] Institute of Computing Technology, Chinese Acad. of Sci.
来源
关键词
Internet of Things; Privacy preservation; Security; Source-location; Wireless sensor networks;
D O I
10.3724/SP.J.1016.2010.01736
中图分类号
学科分类号
摘要
Wireless sensor networks are widely deployed to monitor valuable objects. Attackers can find out the source node by hop-by-hop backtracking strategy. So, we need provide source anonymity for sensor networks. This paper examines that the phantom source nodes generated by the existing source location privacy preservation protocols are near the real source. So they can not protect the real source node well. As such, this paper proposes a protocol called PUSBRF(Source Location Privacy Preservation Protocol in Wireless Sensor Network Using Source-Based Restricted Flooding). And based on PUSBRF, it proposes another protocol called EPUSBRF (Enhancement Source Location Privacy Preservation Protocol in Wireless Sensor Network Using Source-Based Restricted Flooding) under the consideration of an attacker with enhancement visual ability. Simulation results show that compared to the existing protocols, the new protocols provide strong source location privacy preservation and the average safety period is increased by nearly one order of magnitude.
引用
收藏
页码:1736 / 1747
页数:11
相关论文
共 20 条
  • [1] Shao M., Zhu S., Zhang W., Cao G., pDCS: Security and privacy support for data-centric sensor networks, Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 1298-1306, (2007)
  • [2] Joseph M., Choudhury R.R., Hiding stars with fireworks location privacy through camouflage, Proceedings of the ACM Special Interest Group on Mobility of Systems, Users, Data and Computing (SIGMOBILE), pp. 345-356, (2009)
  • [3] Hoh B., Gruteser M., Xiong H., Alrabady A., Enhancing security and privacy in traffic-monitoring systems, IEEE Pervasive Computing, 5, 4, pp. 38-46, (2006)
  • [4] Chen X.Q., Makki K., Yen K., Sensor network security: A survey, IEEE Communications Surveys and Tutorials, 11, 2, pp. 52-73, (2009)
  • [5] Ozturk C., Zhang Y., Trappe W., Source-location privacy in energy constrained sensor networks routing, Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN), pp. 88-93, (2004)
  • [6] Kamat P., Zhang Y., Trappe W., Ozturk C., Enhancing source-location privacy in sensor network routing, Proceedings of the 25th International Conference on Distributed Computing Systems(ICDCS), pp. 599-608, (2005)
  • [7] Wang W.P., Chen L., Wang J.X., A source-location privacy protocol in WSN based on locational angle, Proceedings of the IEEE International Conference on Communications (ICC), pp. 1630-1634, (2008)
  • [8] Kang L., Protecting location privacy in large-scale wireless sensor networks, Proceedings of the IEEE International Conference on Communications(ICC), (2009)
  • [9] Mehta K., Liu D., Wright M., Location privacy in sensor networks against a global eavesdropper, Proceedings of the IEEE International Conference on Network Protocols(ICNP), pp. 314-323, (2007)
  • [10] Yang Y., Shao M., Zhu S., Urgaonkar B., Cao G., Towards event source unobservability with minimum network traffic in sensor networks, Proceedings of the ACM Conference on Wireless Network Security(WiSec), pp. 77-88, (2008)