Home > Research > Publications & Outputs > Towards Fake Sources for Source Location Privac...

Links

Text available via DOI:

View graph of relations

Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. / Laikin, Joanna F.; Bradbury, Matthew; Gu, Chen et al.
2016 IEEE International Conference on Communication Systems (ICCS). IEEE, 2017. p. 1-6.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Laikin, JF, Bradbury, M, Gu, C & Leeke, M 2017, Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. in 2016 IEEE International Conference on Communication Systems (ICCS). IEEE, pp. 1-6. https://doi.org/10.1109/ICCS.2016.7833572

APA

Laikin, J. F., Bradbury, M., Gu, C., & Leeke, M. (2017). Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In 2016 IEEE International Conference on Communication Systems (ICCS) (pp. 1-6). IEEE. https://doi.org/10.1109/ICCS.2016.7833572

Vancouver

Laikin JF, Bradbury M, Gu C, Leeke M. Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In 2016 IEEE International Conference on Communication Systems (ICCS). IEEE. 2017. p. 1-6 Epub 2016 Dec 14. doi: 10.1109/ICCS.2016.7833572

Author

Laikin, Joanna F. ; Bradbury, Matthew ; Gu, Chen et al. / Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. 2016 IEEE International Conference on Communication Systems (ICCS). IEEE, 2017. pp. 1-6

Bibtex

@inproceedings{2678b52645664e45b9ac224ac4766d95,
title = "Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources",
abstract = "Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.",
keywords = "Algorithm design and analysis, Energy consumption, Monitoring, Position measurement, Privacy, Safety, Wireless sensor networks, Context Privacy, Fake Source, Location, Multiple Sources, Wireless Sensor Networks",
author = "Laikin, {Joanna F.} and Matthew Bradbury and Chen Gu and Matthew Leeke",
year = "2017",
month = jan,
day = "26",
doi = "10.1109/ICCS.2016.7833572",
language = "English",
isbn = "9781509034246",
pages = "1--6",
booktitle = "2016 IEEE International Conference on Communication Systems (ICCS)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources

AU - Laikin, Joanna F.

AU - Bradbury, Matthew

AU - Gu, Chen

AU - Leeke, Matthew

PY - 2017/1/26

Y1 - 2017/1/26

N2 - Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.

AB - Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.

KW - Algorithm design and analysis

KW - Energy consumption

KW - Monitoring

KW - Position measurement

KW - Privacy

KW - Safety

KW - Wireless sensor networks

KW - Context Privacy

KW - Fake Source

KW - Location

KW - Multiple Sources

KW - Wireless Sensor Networks

U2 - 10.1109/ICCS.2016.7833572

DO - 10.1109/ICCS.2016.7833572

M3 - Conference contribution/Paper

SN - 9781509034246

SP - 1

EP - 6

BT - 2016 IEEE International Conference on Communication Systems (ICCS)

PB - IEEE

ER -