Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks

被引:0
|
作者
Tang, Di [1 ]
Gu, Jian [1 ]
Hang, Weijia [2 ]
Ma, Xiao [2 ]
机构
[1] Minist Publ Secur, Res Inst 3, Shanghai 200031, Peoples R China
[2] Shaan Xi Normal Univ, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) have been widely used in various applications for continuous event monitoring and detection. Dual to lack of a protected physical boundary, WSNs are vulnerable to trace-back attacks. The existing secure routing protocols are designed to protect source location privacy by increasing uncertainty of routing direction against statistic analysis on traffic flow. Nevertheless, the security has not been quantitatively measured and shown the direction of secure routing design. In this paper, we propose a theoretical security measurement scheme to define and analyze the quantitative amount of the information leakage from each eavesdropped message. Through the theoretical analysis, we identify vulnerabilities of existing routing algorithms and quantitatively compute the direction information leakage based on various routing strategy. The theoretical analysis results also indicate the direction for maximization of source location privacy.
引用
收藏
页码:805 / 809
页数:5
相关论文
共 50 条
  • [31] Analysis of location privacy solutions in wireless sensor networks
    Rios, R.
    Lopez, J.
    IET COMMUNICATIONS, 2011, 5 (17) : 2518 - 2532
  • [32] Fake source-based source location privacy in wireless sensor networks
    Jhumka, Arshad
    Bradbury, Matthew
    Leeke, Matthew
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2999 - 3020
  • [33] A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
    Bradbury, Matthew
    Leeke, Matthew
    Jhumka, Arshad
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 531 - 538
  • [34] Source Location Privacy Using Data Mules in Wireless Sensor Networks
    Singh, Jyoti Prakash
    Roy, Pradeep Kumar
    Singh, Sunil Kumar
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2743 - 2747
  • [35] Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation
    Yang, Wenbo
    Zhu, Wen Tao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 252 - 266
  • [36] Hybrid online protocols for source location privacy in wireless sensor networks
    Bradbury, Matthew
    Jhumka, Arshad
    Leeke, Matthew
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 115 : 67 - 81
  • [37] A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhang, Wenbo
    Guizani, Mohsen
    Chan, Sammy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) : 5917 - 5927
  • [38] Virtual Source-Based Location Privacy for Wireless Sensor Networks
    Raja, R. Altis
    Valli, S.
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 475 - 481
  • [39] Isolated Adversary Zone for Source Location Privacy in Wireless Sensor Networks
    Nassiri, Ali
    Razzaque, M. A.
    Abdullah, Abdul Hanan
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 108 - 113
  • [40] Source location privacy in wireless sensor networks: What is the right choice of privacy metric?
    Tejodbhav Koduru
    R. Manjula
    Wireless Networks, 2023, 29 : 1891 - 1898