The Library
Towards understanding source location privacy in wireless sensor networks through fake sources
Tools
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012 pp. 760-768. ISBN 9781467321723. doi:10.1109/TrustCom.2012.281
|
PDF
WRAP_slp.pdf - Accepted Version - Requires a PDF viewer. Download (226Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/TrustCom.2012.281
Abstract
Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks , Computer security, Hackers, Eavesdropping, Cryptography, Data encryption (Computer science) | ||||
ISBN: | 9781467321723 | ||||
Official Date: | 2012 | ||||
Dates: |
|
||||
Page Range: | pp. 760-768 | ||||
DOI: | 10.1109/TrustCom.2012.281 | ||||
Status: | Not Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Date of first compliant deposit: | 11 January 2016 | ||||
Date of first compliant Open Access: | 11 January 2016 | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12) | ||||
Type of Event: | Conference | ||||
Location of Event: | Liverpool, UK | ||||
Date(s) of Event: | 25-27 Jun 2012 | ||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year