Home > Research > Publications & Outputs > Towards Understanding Source Location Privacy i...


Text available via DOI:

View graph of relations

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Publication date6/09/2012
Host publication2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Number of pages9
ISBN (Print)9781467321723
<mark>Original language</mark>English


Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.