Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy
AU - Thomason, Alasdair
AU - Leeke, Matthew
AU - Bradbury, Matthew
AU - Jhumka, Arshad
PY - 2013/12/12
Y1 - 2013/12/12
N2 - Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.
AB - Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.
KW - protocols
KW - telecommunication security
KW - wireless sensor networks
KW - broadcast rates
KW - collisions
KW - eavesdropping
KW - energy efficient fake source protocols
KW - message collisions
KW - sensor nodes
KW - source location privacy problem
KW - Context
KW - Monitoring
KW - Position measurement
KW - Privacy
KW - Protocols
KW - Safety
KW - Wireless sensor networks
KW - Collisions
KW - Distributed Eavesdropper
KW - Fake Source
KW - Security
KW - Source Location Privacy
KW - Wireless Sensor Networks
U2 - 10.1109/TrustCom.2013.81
DO - 10.1109/TrustCom.2013.81
M3 - Conference contribution/Paper
SP - 667
EP - 674
BT - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PB - IEEE
ER -