Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources
AU - Laikin, Joanna F.
AU - Bradbury, Matthew
AU - Gu, Chen
AU - Leeke, Matthew
PY - 2017/1/26
Y1 - 2017/1/26
N2 - Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.
AB - Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.
KW - Algorithm design and analysis
KW - Energy consumption
KW - Monitoring
KW - Position measurement
KW - Privacy
KW - Safety
KW - Wireless sensor networks
KW - Context Privacy
KW - Fake Source
KW - Location
KW - Multiple Sources
KW - Wireless Sensor Networks
U2 - 10.1109/ICCS.2016.7833572
DO - 10.1109/ICCS.2016.7833572
M3 - Conference contribution/Paper
SN - 9781509034246
SP - 1
EP - 6
BT - 2016 IEEE International Conference on Communication Systems (ICCS)
PB - IEEE
ER -