The Library
Fake source-based source location privacy in wireless sensor networks
Tools
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. doi:10.1002/cpe.3242 ISSN 1532-0626.
|
PDF
WRAP_Jhumka_0921660-cs-060115-ccpe14.pdf - Accepted Version - Requires a PDF viewer. Download (1194Kb) | Preview |
Official URL: http://dx.doi.org/10.1002/cpe.3242
Abstract
The development of novel wireless sensor network (WSN) applications, such as asset monitoring, has led to novel reliability requirements. One such property is source location privacy (SLP). The original SLP problem is to protect the location of a source node in a WSN from a single distributed eavesdropper attacker. Several techniques have been proposed to address the SLP problem, and most of them use some form of traffic analysis and engineering to provide enhanced SLP. The use of fake sources is considered to be promising for providing SLP, and several works have investigated the effectiveness of the fake sources approach under various attacker models. However, very little work has been done to understand the theoretical underpinnings of the fake source technique. In this paper, we (i) provide a novel formalisation of the fake sources selection problem; (ii) prove the fake sources selection problem to be NP-complete; (iii) provide parametric heuristics for three different network configurations; and (iv) show that these heuristics provide (near) optimal levels of SLP under appropriate parameterisation. Our results show that fake sources can provide a high level of SLP. Our work is the first to investigate the theoretical underpinnings of the fake source technique.
Item Type: | Journal Article | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks, Eavesdropping, Privacy | ||||||||||
Journal or Publication Title: | Concurrency and Computation: Practice and Experience | ||||||||||
Publisher: | John Wiley & Sons Ltd. | ||||||||||
ISSN: | 1532-0626 | ||||||||||
Official Date: | 25 August 2015 | ||||||||||
Dates: |
|
||||||||||
Volume: | 27 | ||||||||||
Number: | 12 | ||||||||||
Number of Pages: | 22 | ||||||||||
Page Range: | pp. 2999-3020 | ||||||||||
DOI: | 10.1002/cpe.3242 | ||||||||||
Status: | Peer Reviewed | ||||||||||
Publication Status: | Published | ||||||||||
Date of first compliant deposit: | 28 December 2015 | ||||||||||
Date of first compliant Open Access: | 28 December 2015 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year