Home > Research > Publications & Outputs > Evaluating the Impact of Broadcast Rates and Co...

Links

Text available via DOI:

View graph of relations

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. / Thomason, Alasdair; Leeke, Matthew; Bradbury, Matthew et al.

12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. p. 667-674.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Thomason, A, Leeke, M, Bradbury, M & Jhumka, A 2013, Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. in 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 667-674. https://doi.org/10.1109/TrustCom.2013.81

APA

Thomason, A., Leeke, M., Bradbury, M., & Jhumka, A. (2013). Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 667-674). IEEE. https://doi.org/10.1109/TrustCom.2013.81

Vancouver

Thomason A, Leeke M, Bradbury M, Jhumka A. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE. 2013. p. 667-674 Epub 2013 Jul 18. doi: 10.1109/TrustCom.2013.81

Author

Thomason, Alasdair ; Leeke, Matthew ; Bradbury, Matthew et al. / Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. pp. 667-674

Bibtex

@inproceedings{7474ebe7afb441b694219ffc77e317e4,
title = "Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy",
abstract = "Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.",
keywords = "protocols, telecommunication security, wireless sensor networks, broadcast rates, collisions, eavesdropping, energy efficient fake source protocols, message collisions, sensor nodes, source location privacy problem, Context, Monitoring, Position measurement, Privacy, Protocols, Safety, Wireless sensor networks, Collisions, Distributed Eavesdropper, Fake Source, Security, Source Location Privacy, Wireless Sensor Networks",
author = "Alasdair Thomason and Matthew Leeke and Matthew Bradbury and Arshad Jhumka",
year = "2013",
month = dec,
day = "12",
doi = "10.1109/TrustCom.2013.81",
language = "English",
pages = "667--674",
booktitle = "12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

AU - Thomason, Alasdair

AU - Leeke, Matthew

AU - Bradbury, Matthew

AU - Jhumka, Arshad

PY - 2013/12/12

Y1 - 2013/12/12

N2 - Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.

AB - Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.

KW - protocols

KW - telecommunication security

KW - wireless sensor networks

KW - broadcast rates

KW - collisions

KW - eavesdropping

KW - energy efficient fake source protocols

KW - message collisions

KW - sensor nodes

KW - source location privacy problem

KW - Context

KW - Monitoring

KW - Position measurement

KW - Privacy

KW - Protocols

KW - Safety

KW - Wireless sensor networks

KW - Collisions

KW - Distributed Eavesdropper

KW - Fake Source

KW - Security

KW - Source Location Privacy

KW - Wireless Sensor Networks

U2 - 10.1109/TrustCom.2013.81

DO - 10.1109/TrustCom.2013.81

M3 - Conference contribution/Paper

SP - 667

EP - 674

BT - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

PB - IEEE

ER -