The Library
On the use of fake sources for source location privacy : trade-offs between energy and privacy
Tools
Jhumka, Arshad, Leeke, Matthew and Shrestha, Sambid (2011) On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, Volume 54 (Number 6). pp. 860-874. doi:10.1093/comjnl/bxr010 ISSN 0010-4620.
|
PDF
WRAP_Jhumka_On_the_Use_of_Fake_Sources_for_Source_Location_Privacy.pdf - Draft Version - Requires a PDF viewer. Download (1678Kb) | Preview |
Official URL: http://dx.doi.org/10.1093/comjnl/bxr010
Abstract
Wireless sensor networks have enabled novel applications such as monitoring, where security is invariably a requirement. One aspect of security, namely source location privacy, is becoming an increasingly important property of some wireless sensor network applications. The fake source technique has been proposed as an efficient technique to handle the source location privacy problem. However, there are several factors that limit the usefulness of current results: (i) the selection of fake sources is dependent on sophisticated nodes, (ii) fake sources are known a priori and (iii) the selection of fake sources is based on a prohibitively expensive pre-configuration phase. In this paper, we investigate the privacy enhancement and energy efficiency of different implementations of the fake source technique that circumvents these limitations. Our results show that the fake source technique is indeed effective in enhancing privacy. Specifically, one implementation achieves near-perfect privacy when there is at least one fake source in the network, at the expense of increased energy consumption. In the presence of multiple attackers, the same implementation yields only a 30% decrease in capture ratio with respect to flooding. To address this problem, we propose a hybrid technique which achieves a corresponding 50% reduction in the capture ratio and a near-perfect privacy whenever at least one fake source exists in the network.
Item Type: | Journal Article | ||||
---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Library of Congress Subject Headings (LCSH): | Wireless sensor networks, Data protection, Routing protocols (Computer network protocols) | ||||
Journal or Publication Title: | The Computer Journal | ||||
Publisher: | Oxford University Press | ||||
ISSN: | 0010-4620 | ||||
Official Date: | June 2011 | ||||
Dates: |
|
||||
Volume: | Volume 54 | ||||
Number: | Number 6 | ||||
Page Range: | pp. 860-874 | ||||
DOI: | 10.1093/comjnl/bxr010 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access |
Data sourced from Thomson Reuters' Web of Knowledge
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year