Home > Research > Publications & Outputs > Deconstructing Source Location Privacy-aware Ro...

Text available via DOI:

View graph of relations

Deconstructing Source Location Privacy-aware Routing Protocols

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Deconstructing Source Location Privacy-aware Routing Protocols. / Jhumka, Arshad; Bradbury, Matthew.
Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM, 2017. p. 431-436 (SAC'17).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Jhumka, A & Bradbury, M 2017, Deconstructing Source Location Privacy-aware Routing Protocols. in Proceedings of the Symposium on Applied Computing. SAC'17, ACM, Marrakech, Morocco , pp. 431-436, SAC '17: Symposium on Applied Computing, Marrakech , Morocco, 3/04/17. https://doi.org/10.1145/3019612.3019655

APA

Jhumka, A., & Bradbury, M. (2017). Deconstructing Source Location Privacy-aware Routing Protocols. In Proceedings of the Symposium on Applied Computing (pp. 431-436). (SAC'17). ACM. https://doi.org/10.1145/3019612.3019655

Vancouver

Jhumka A, Bradbury M. Deconstructing Source Location Privacy-aware Routing Protocols. In Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM. 2017. p. 431-436. (SAC'17). doi: 10.1145/3019612.3019655

Author

Jhumka, Arshad ; Bradbury, Matthew. / Deconstructing Source Location Privacy-aware Routing Protocols. Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM, 2017. pp. 431-436 (SAC'17).

Bibtex

@inproceedings{4e5dccc55efc410baa7c8fc212b59271,
title = "Deconstructing Source Location Privacy-aware Routing Protocols",
abstract = "Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol.In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.",
keywords = "components, decomposition, routing, source location privacy, spatial, temporal, wireless sensor networks",
author = "Arshad Jhumka and Matthew Bradbury",
year = "2017",
month = apr,
day = "1",
doi = "10.1145/3019612.3019655",
language = "English",
isbn = "9781450344869",
series = "SAC'17",
publisher = "ACM",
pages = "431--436",
booktitle = "Proceedings of the Symposium on Applied Computing",
note = "SAC '17: Symposium on Applied Computing, SAC ; Conference date: 03-04-2017 Through 07-04-2017",
url = "https://dl.acm.org/doi/proceedings/10.1145/3019612",

}

RIS

TY - GEN

T1 - Deconstructing Source Location Privacy-aware Routing Protocols

AU - Jhumka, Arshad

AU - Bradbury, Matthew

PY - 2017/4/1

Y1 - 2017/4/1

N2 - Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol.In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.

AB - Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol.In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.

KW - components

KW - decomposition

KW - routing

KW - source location privacy

KW - spatial

KW - temporal

KW - wireless sensor networks

U2 - 10.1145/3019612.3019655

DO - 10.1145/3019612.3019655

M3 - Conference contribution/Paper

SN - 9781450344869

T3 - SAC'17

SP - 431

EP - 436

BT - Proceedings of the Symposium on Applied Computing

PB - ACM

CY - Marrakech, Morocco

T2 - SAC '17: Symposium on Applied Computing

Y2 - 3 April 2017 through 7 April 2017

ER -