An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures

نویسندگان

  • Yi Yang
  • Sencun Zhu
  • Guohong Cao
  • Thomas F. La Porta
چکیده

Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An active global attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it. As case studies, we first apply such an attack model to previous schemes, with results indicating that even these theoretically sound constructions are vulnerable consequently. We then propose a lightweight dynamic source anonymity scheme that seamlessly switches from a statistically strong source anonymity scheme to a k-anonymity scheme on demand. Moreover, we enhance the traditional k-anonymity scheme with a spatial ldiversity capability by cautiously placing fake sources, to thwart attacker’s on-site examinations. Simulation results demonstrate that the attacker’s gain in our scheme is greatly reduced when compared to the k-anonymity scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures

Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An active global attack model, which is more realistic and powerful th...

متن کامل

Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might ...

متن کامل

Location Privacy in Wireless Sensor Networks

The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...

متن کامل

Security for Source Node Privacy in Wireless Sensor Network

Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. We are generated more fake node, fake packet and to create anonymity node for source location privacy. They are providing privacy to the event detecting, tracking sensor node and in...

متن کامل

Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have many promising applications for monitoring critical regions, like military surveillance and wildlife monitoring. In such applications, it is critical to protect the location of the source sensor that generates the data, as exposure of this information usually reveals the location of the object being monitored. Traditional security mechanisms, like encryption...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009