The Library
Deconstructing source location privacy-aware routing protocols
Tools
Jhumka, Arshad and Bradbury, Matthew S. (2017) Deconstructing source location privacy-aware routing protocols. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 431-436. ISBN 9781450344869.
|
PDF
WRAP-deconstructing-source-location-privacy-aware-routing-Jhumka-2017.pdf - Accepted Version - Requires a PDF viewer. Download (1227Kb) | Preview |
Official URL: https://doi.org/10.1145/3019612.3019655
Abstract
Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol. In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.
Item Type: | Conference Item (Paper) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||||
Library of Congress Subject Headings (LCSH): | Computer security, Routing (Computer network management), Wireless sensor networks | ||||||||||
Journal or Publication Title: | Proceedings of the Symposium on Applied Computing | ||||||||||
Publisher: | ACM | ||||||||||
ISBN: | 9781450344869 | ||||||||||
Official Date: | 3 April 2017 | ||||||||||
Dates: |
|
||||||||||
Page Range: | pp. 431-436 | ||||||||||
Status: | Peer Reviewed | ||||||||||
Publication Status: | Published | ||||||||||
Date of first compliant deposit: | 5 December 2016 | ||||||||||
Date of first compliant Open Access: | 31 May 2017 | ||||||||||
Conference Paper Type: | Paper | ||||||||||
Title of Event: | 32nd ACM SIGAPP Symposium On Applied Computing | ||||||||||
Type of Event: | Conference | ||||||||||
Location of Event: | Marrakech, Morocco | ||||||||||
Date(s) of Event: | 3-7 April 2017 | ||||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year