The Library
A near-optimal source location privacy scheme for wireless sensor networks
Tools
Bradbury, Matthew S. and Jhumka, Arshad (2017) A near-optimal source location privacy scheme for wireless sensor networks. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: IEEE CPS Proceedings ISBN 9781509049066. ISSN 2324-9013.
|
PDF
WRAP-near-optimal-source-privacy-wireless-Bradbury-2017.pdf - Accepted Version - Requires a PDF viewer. Download (827Kb) | Preview |
Official URL: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2...
Abstract
As interest in using Wireless Sensor Networks (WSNs) for deployments in scenarios such as asset monitoring increases, the need to consider security and privacy issues also becomes greater. One such issue is that of Source Location Privacy (SLP) where the location of a source in the network needs to be kept secret from a malicious attacker. Many techniques have been proposed to provide SLP against an eavesdropping attacker. Most techniques work by first developing an algorithm followed by extensive performance validation. Differently, in this paper, we model the SLP problem as an Integer Linear Programming optimization problem. Using the IBM ILOG CPLEX optimiser, we obtain an optimal solution to provide SLP. However, that solution is centralised (i.e., requires network-wide knowledge) making the solution unsuitable for WSNs. Therefore, we develop a distributed version of the solution and evaluate the level of privacy provided by it. The solution is hybrid in nature, in that it uses both spatial and temporal redundancy to provide SLP. Results from extensive simulations using the TOSSIM WSN simulator indicate a 1% capture ratio is achievable as a trade-off for an increase in the delivery latency.
Item Type: | Conference Item (Paper) | ||||||
---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks -- Security measures, Routing (Computer network management) | ||||||
Journal or Publication Title: | IEEE CPS Proceedings | ||||||
Publisher: | IEEE | ||||||
ISBN: | 9781509049066 | ||||||
ISSN: | 2324-9013 | ||||||
Official Date: | 11 September 2017 | ||||||
Dates: |
|
||||||
Status: | Peer Reviewed | ||||||
Publication Status: | Published | ||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||
Date of first compliant deposit: | 9 June 2017 | ||||||
Date of first compliant Open Access: | 9 June 2017 | ||||||
Funder: | Engineering and Physical Sciences Research Council (EPSRC) | ||||||
Grant number: | EP/M506679/1 | ||||||
Conference Paper Type: | Paper | ||||||
Title of Event: | 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17) | ||||||
Type of Event: | Conference | ||||||
Location of Event: | Sydney, Australia | ||||||
Date(s) of Event: | 1-4 Aug 2017 | ||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year