Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
AU - Bradbury, Matthew
AU - Leeke, Matthew
AU - Jhumka, Arshad
PY - 2015/12/3
Y1 - 2015/12/3
N2 - Wireless sensor networks (WSNs) are commonly used in asset monitoring applications, where it is often desirable for the location of the asset being monitored to be kept private. The source location privacy (SLP) problem involves protecting the location of a WSN source node from an attacker who is attempting to locate it. Among the most promising approaches to the SLP problem is the use of fake sources, with much existing research demonstrating their efficacy. Despite the effectiveness of the approach, the most effective algorithms providing SLP require network and situational knowledge that makes their deployment impractical in many contexts. In this paper, we develop a novel dynamic fake sources-based algorithm for SLP. We show that the algorithm provides state-of-the-art levels of location privacy under practical operational assumptions.
AB - Wireless sensor networks (WSNs) are commonly used in asset monitoring applications, where it is often desirable for the location of the asset being monitored to be kept private. The source location privacy (SLP) problem involves protecting the location of a WSN source node from an attacker who is attempting to locate it. Among the most promising approaches to the SLP problem is the use of fake sources, with much existing research demonstrating their efficacy. Despite the effectiveness of the approach, the most effective algorithms providing SLP require network and situational knowledge that makes their deployment impractical in many contexts. In this paper, we develop a novel dynamic fake sources-based algorithm for SLP. We show that the algorithm provides state-of-the-art levels of location privacy under practical operational assumptions.
KW - data privacy
KW - telecommunication security
KW - wireless sensor networks
KW - SLP problem
KW - WSN source node
KW - asset monitoring applications
KW - dynamic fake source algorithm
KW - location protection
KW - source location privacy problem
KW - Context
KW - Heuristic algorithms
KW - Monitoring
KW - Position measurement
KW - Privacy
KW - Temperature sensors
KW - Wireless sensor networks
KW - Dynamic
KW - Sensor Networks
KW - Source Location Privacy
U2 - 10.1109/Trustcom.2015.416
DO - 10.1109/Trustcom.2015.416
M3 - Conference contribution/Paper
SP - 531
EP - 538
BT - 2015 IEEE Trustcom/BigDataSE/ISPA
PB - IEEE
ER -