The Library
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy
Tools
Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S. and Jhumka, Arshad (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013. Published in: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) pp. 667-674. doi:10.1109/TrustCom.2013.81
|
PDF
WRAP_Leeke_Evaluating_the_Impact_of_Broadcast_Rates_and_Collisions_on_Fake_Source_Protocols_for_Source_Location_Privacy.pdf - Accepted Version - Requires a PDF viewer. Download (530Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/TrustCom.2013.81
Abstract
Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks -- Security measures | ||||
Journal or Publication Title: | Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) | ||||
Publisher: | Conference Publishing Services | ||||
Official Date: | July 2013 | ||||
Dates: |
|
||||
Page Range: | pp. 667-674 | ||||
DOI: | 10.1109/TrustCom.2013.81 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Date of first compliant deposit: | 26 December 2015 | ||||
Date of first compliant Open Access: | 26 December 2015 | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13) | ||||
Type of Event: | Conference | ||||
Location of Event: | Melbourne, Australia | ||||
Date(s) of Event: | 16-18 July 2013 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year