Source location privacy in wireless sensor networks under practical scenarios : routing protocols, parameterisations and trade-offs

[thumbnail of WRAP_Theses_Gu_2018.pdf]
Preview
PDF
WRAP_Theses_Gu_2018.pdf - Submitted Version - Requires a PDF viewer.

Download (5MB) | Preview

Request Changes to record.

Abstract

As wireless sensor networks (WSNs) have been applied across a spectrum of application domains, source location privacy (SLP) has emerged as a significant issue, particularly in security-critical situations. In seminal work on SLP, several protocols were proposed as viable approaches to address the issue of SLP. However, most state-of-the-art approaches work under specific network assumptions. For example, phantom routing, one of the most popular routing protocols for SLP, assumes a single source. On the other hand, in practical scenarios for SLP, this assumption is not realistic, as there will be multiple data sources. Other issues of practical interest include network configurations. Thus, thesis addresses the impact of these practical considerations on SLP. The first step is the evaluation of phantom routing under various configurations, e.g., multiple sources and network configurations. The results show that phantom routing does not scale to handle multiple sources while providing high SLP at the expense of low messages yield. Thus, an important issue arises as a result of this observation that the need for a routing protocol that can handle multiple sources. As such, a novel parametric routing protocol is proposed, called phantom walkabouts, for SLP for multi-source WSNs. A large-scale experiments are conducted to evaluate the efficiency of phantom walkabouts. The main observation is that phantom walkabouts can provide high level of SLP at the expense of energy and/or data yield. To deal with these trade-offs, a framework that allows reasoning about trade-offs needs to develop. Thus, a decision theoretic methodology is proposed that allows reasoning about these trade-offs. The results showcase the viability of this methodology via several case studies.

Item Type: Thesis [via Doctoral College] (PhD)
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Library of Congress Subject Headings (LCSH): Wireless sensor networks -- Security measures, Location-based services -- Security measures, Computer network protocols, Routers (Computer networks)
Official Date: April 2018
Dates:
Date
Event
April 2018
Submitted
Institution: University of Warwick
Theses Department: Department of Computer Science
Thesis Type: PhD
Publication Status: Unpublished
Supervisor(s)/Advisor: Jhumka, Arshad, 1974-
Format of File: pdf
Extent: xvii, 176 leaves : illustrations, charts
Language: eng
URI: https://wrap.warwick.ac.uk/110792/

Export / Share Citation


Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item