The Library
Understanding source location privacy protocols in sensor networks via perturbation of Time Series
Tools
Bradbury, Matthew S. and Jhumka, Arshad (2017) Understanding source location privacy protocols in sensor networks via perturbation of Time Series. In: IEEE International Conference on Computer Communications, Atlanta, GA, USA, 01-05 May 2017. Published in: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017 pp. 1-9. ISBN 9781509053377. doi:10.1109/INFOCOM.2017.8057122 ISSN 0743-166X.
PDF
WRAP_Bradbury_pid4622985.pdf - Accepted Version - Requires a PDF viewer. Download (618Kb) |
Official URL: http://doi.org/10.1109/INFOCOM.2017.8057122
Abstract
Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP has focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Other work has focused on analysing the level of SLP being imparted by a specific protocol. In this paper, we adopt a different approach where we model the attacker movement as a time series and use information theoretic concepts to infer the properties of a routing protocol that imparts high levels of SLP. We propose the notion of a properly competing path that causes an attacker to “stall” when moving towards the source. This concept provides the basis for developing a perturbation model, similar to those in privacy-preserving data mining. We then show how to use properly competing paths to develop properties of an SLP-aware routing protocol. Further, we show how different SLP-aware routing protocols can be obtained through different instantiations of the framework. Those instantiations are obtained based on a notion of information loss achieved through the use of the perturbation model proposed.
Item Type: | Conference Item (Paper) | ||||||
---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks -- Security measures, Entropy | ||||||
Series Name: | IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies | ||||||
Journal or Publication Title: | IEEE INFOCOM 2017 - IEEE Conference on Computer Communications | ||||||
Publisher: | IEEE Computer Society | ||||||
ISBN: | 9781509053377 | ||||||
ISSN: | 0743-166X | ||||||
Official Date: | 5 October 2017 | ||||||
Dates: |
|
||||||
Volume: | 2017 | ||||||
Page Range: | pp. 1-9 | ||||||
DOI: | 10.1109/INFOCOM.2017.8057122 | ||||||
Status: | Peer Reviewed | ||||||
Publication Status: | Published | ||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||
Date of first compliant deposit: | 12 December 2016 | ||||||
Date of first compliant Open Access: | 12 December 2016 | ||||||
Conference Paper Type: | Paper | ||||||
Title of Event: | IEEE International Conference on Computer Communications | ||||||
Type of Event: | Conference | ||||||
Location of Event: | Atlanta, GA, USA | ||||||
Date(s) of Event: | 01-05 May 2017 | ||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year