Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Towards fake sources for source location privacy in wireless sensor networks with multiple sources

Tools
- Tools
+ Tools

Laikin, Joanna F., Bradbury, Matthew S., Gu, Chen and Leeke, Matthew (2016) Towards fake sources for source location privacy in wireless sensor networks with multiple sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16) , Shenzhen, China, 14-16 Dec 2016. Published in: 2016 IEEE International Conference on Communication Systems (ICCS), ISBN 9781509034239.

[img] PDF
WRAP_1170047-dcs-031116-iccs16.pdf - Accepted Version - Requires a PDF viewer.

Download (732Kb)
Official URL: http://doi.org/10.1109/ICCS.2016.7833572

Request Changes to record.

Abstract

Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.

Item Type: Conference Item (Paper)
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Wireless sensor networks -- Security measures, Privacy
Journal or Publication Title: 2016 IEEE International Conference on Communication Systems (ICCS),
Publisher: IEEE
ISBN: 9781509034239
Official Date: 2016
Dates:
DateEvent
2016Available
13 October 2016Accepted
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
Conference Paper Type: Paper
Title of Event: 15th IEEE International Conference on Communication Systems (ICCS'16)
Type of Event: Conference
Location of Event: Shenzhen, China
Date(s) of Event: 14-16 Dec 2016

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us