On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
نویسندگان
چکیده
Over the last decade the advent of wireless sensor networks has enabled several novel classes of application, including monitoring and tracking. In the case of monitoring applications, the deployment of sensor networks will vary from mission critical applications, such as military, health and asset monitoring, to non-critical applications, such as temperature and humidity control. For some critical applications, such as military surveillance or asset monitoring, security is an important requirement. One important aspect of security is privacy. Privacy is often important in critical applications, as sensitive information may need to be kept private. However, owing to the fact that wireless sensor networks operate in a broadcast medium, attackers can easily intercept messages and attempt to subvert a system. The privacy threats that exist for sensor networks can be broadly classified along two dimensions, namely (i) content-based privacy threats and (ii) contextbased privacy threats. Content-based privacy threats relate to threats that are based on the contents of messages, i.e., the threats are against the values generated by the various network layers, either at the application level, e.g., sensed values, or lower-layer levels, e.g., time-stamps. Context-based privacy threats are based on the context associated with the measurement and transmission of sensed data. Context is a multi-attribute concept that captures several environmental aspects associated with sensed data, including aspects such as location and time. While content-based threats are well-understood [16], context-based threats are becoming increasingly important. For content-based threats, nodes launching attacks are often modelled as Byzantine nodes [9], with cryptographic techniques often being used to address these problems [9] [2]. However, cryptographic techniques do not address context-based threats. One aspect of context that is important in several applications is location. For example, in a military situation, location can be that of a soldier. In asset monitoring, the location can be that of a very expensive painting in a museum. Location information can be embedded in a message, but still remain inacces-
منابع مشابه
On the Tradeoff Between Privacy and Energy in Wireless Sensor Networks
Source location privacy is becoming an increasingly important property of some wireless sensor network applications. The fake source technique has been proposed as an approach for handling the source location privacy problem in these situations. However, whilst the efficiency of the fake source techniques is well documented, there are several factors that limit the usefulness of current results...
متن کاملDifferentially Private Local Electricity Markets
Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...
متن کاملSecurity for Source Node Privacy in Wireless Sensor Network
Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. We are generated more fake node, fake packet and to create anonymity node for source location privacy. They are providing privacy to the event detecting, tracking sensor node and in...
متن کاملA new 'Direction' for source location privacy in wireless sensor networks'
Preserving source location privacy in wireless sensor networks can be critical for several practical applications. Existing solutions proposed specifically for sensor networks rely on a combination of dynamic routing and dummy traffic to hide real event messages. While some privacy protection guarantees can be given, these solutions also tend to be expensive due to fake transmissions and non-sh...
متن کاملPreserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper
While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. J.
دوره 54 شماره
صفحات -
تاریخ انتشار 2011