Home > Research > Publications & Outputs > Fake source-based source location privacy in wi...

Links

Text available via DOI:

View graph of relations

Fake source-based source location privacy in wireless sensor networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Fake source-based source location privacy in wireless sensor networks. / Jhumka, Arshad; Bradbury, Matthew; Leeke, Matthew.
In: Concurrency and Computation: Practice and Experience, Vol. 27, No. 12, 25.08.2015, p. 2999-3020.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Jhumka, A, Bradbury, M & Leeke, M 2015, 'Fake source-based source location privacy in wireless sensor networks', Concurrency and Computation: Practice and Experience, vol. 27, no. 12, pp. 2999-3020. https://doi.org/10.1002/cpe.3242

APA

Jhumka, A., Bradbury, M., & Leeke, M. (2015). Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27(12), 2999-3020. https://doi.org/10.1002/cpe.3242

Vancouver

Jhumka A, Bradbury M, Leeke M. Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience. 2015 Aug 25;27(12):2999-3020. Epub 2015 Apr 1. doi: 10.1002/cpe.3242

Author

Jhumka, Arshad ; Bradbury, Matthew ; Leeke, Matthew. / Fake source-based source location privacy in wireless sensor networks. In: Concurrency and Computation: Practice and Experience. 2015 ; Vol. 27, No. 12. pp. 2999-3020.

Bibtex

@article{8079b923a7014593ae7534d9b6e57db7,
title = "Fake source-based source location privacy in wireless sensor networks",
abstract = "The development of novel wireless sensor network (WSN) applications, such as asset monitoring, has led to novel reliability requirements. One such property is source location privacy (SLP). The original SLP problem is to protect the location of a source node in a WSN from a single distributed eavesdropper attacker. Several techniques have been proposed to address the SLP problem, and most of them use some form of traffic analysis and engineering to provide enhanced SLP. The use of fake sources is considered to be promising for providing SLP, and several works have investigated the effectiveness of the fake sources approach under various attacker models. However, very little work has been done to understand the theoretical underpinnings of the fake source technique. In this paper, we (i) provide a novel formalisation of the fake sources selection problem; (ii) prove the fake sources selection problem to be NP-complete; (iii) provide parametric heuristics for three different network configurations; and (iv) show that these heuristics provide (near) optimal levels of SLP under appropriate parameterisation. Our results show that fake sources can provide a high level of SLP. Our work is the first to investigate the theoretical underpinnings of the fake source technique. Copyright {\^A}copyright 2014 John Wiley & Sons, Ltd.",
keywords = "complexity, distributed eavesdropper, fake source, source location privacy, wireless sensor networks",
author = "Arshad Jhumka and Matthew Bradbury and Matthew Leeke",
year = "2015",
month = aug,
day = "25",
doi = "10.1002/cpe.3242",
language = "English",
volume = "27",
pages = "2999--3020",
journal = "Concurrency and Computation: Practice and Experience",
issn = "1532-0634",
publisher = "John Wiley and Sons Ltd",
number = "12",

}

RIS

TY - JOUR

T1 - Fake source-based source location privacy in wireless sensor networks

AU - Jhumka, Arshad

AU - Bradbury, Matthew

AU - Leeke, Matthew

PY - 2015/8/25

Y1 - 2015/8/25

N2 - The development of novel wireless sensor network (WSN) applications, such as asset monitoring, has led to novel reliability requirements. One such property is source location privacy (SLP). The original SLP problem is to protect the location of a source node in a WSN from a single distributed eavesdropper attacker. Several techniques have been proposed to address the SLP problem, and most of them use some form of traffic analysis and engineering to provide enhanced SLP. The use of fake sources is considered to be promising for providing SLP, and several works have investigated the effectiveness of the fake sources approach under various attacker models. However, very little work has been done to understand the theoretical underpinnings of the fake source technique. In this paper, we (i) provide a novel formalisation of the fake sources selection problem; (ii) prove the fake sources selection problem to be NP-complete; (iii) provide parametric heuristics for three different network configurations; and (iv) show that these heuristics provide (near) optimal levels of SLP under appropriate parameterisation. Our results show that fake sources can provide a high level of SLP. Our work is the first to investigate the theoretical underpinnings of the fake source technique. Copyright Âcopyright 2014 John Wiley & Sons, Ltd.

AB - The development of novel wireless sensor network (WSN) applications, such as asset monitoring, has led to novel reliability requirements. One such property is source location privacy (SLP). The original SLP problem is to protect the location of a source node in a WSN from a single distributed eavesdropper attacker. Several techniques have been proposed to address the SLP problem, and most of them use some form of traffic analysis and engineering to provide enhanced SLP. The use of fake sources is considered to be promising for providing SLP, and several works have investigated the effectiveness of the fake sources approach under various attacker models. However, very little work has been done to understand the theoretical underpinnings of the fake source technique. In this paper, we (i) provide a novel formalisation of the fake sources selection problem; (ii) prove the fake sources selection problem to be NP-complete; (iii) provide parametric heuristics for three different network configurations; and (iv) show that these heuristics provide (near) optimal levels of SLP under appropriate parameterisation. Our results show that fake sources can provide a high level of SLP. Our work is the first to investigate the theoretical underpinnings of the fake source technique. Copyright Âcopyright 2014 John Wiley & Sons, Ltd.

KW - complexity

KW - distributed eavesdropper

KW - fake source

KW - source location privacy

KW - wireless sensor networks

U2 - 10.1002/cpe.3242

DO - 10.1002/cpe.3242

M3 - Journal article

VL - 27

SP - 2999

EP - 3020

JO - Concurrency and Computation: Practice and Experience

JF - Concurrency and Computation: Practice and Experience

SN - 1532-0634

IS - 12

ER -