An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
نویسندگان
چکیده
Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An active global attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it. As case studies, we first apply such an attack model to previous schemes, with results indicating that even these theoretically sound constructions are vulnerable consequently. We then propose a lightweight dynamic source anonymity scheme that seamlessly switches from a statistically strong source anonymity scheme to a k-anonymity scheme on demand. Moreover, we enhance the traditional k-anonymity scheme with a spatial ldiversity capability by cautiously placing fake sources, to thwart attacker’s on-site examinations. Simulation results demonstrate that the attacker’s gain in our scheme is greatly reduced when compared to the k-anonymity scheme.
منابع مشابه
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An active global attack model, which is more realistic and powerful th...
متن کاملFortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might ...
متن کاملLocation Privacy in Wireless Sensor Networks
The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...
متن کاملSecurity for Source Node Privacy in Wireless Sensor Network
Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. We are generated more fake node, fake packet and to create anonymity node for source location privacy. They are providing privacy to the event detecting, tracking sensor node and in...
متن کاملUsing Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have many promising applications for monitoring critical regions, like military surveillance and wildlife monitoring. In such applications, it is critical to protect the location of the source sensor that generates the data, as exposure of this information usually reveals the location of the object being monitored. Traditional security mechanisms, like encryption...
متن کامل