Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources
AU - Jhumka, Arshad
AU - Bradbury, Matthew
AU - Leeke, Matthew
PY - 2012/9/6
Y1 - 2012/9/6
N2 - Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.
AB - Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.
KW - computational complexity
KW - data privacy
KW - telecommunication security
KW - wireless sensor networks
KW - NP-complete problem
KW - asset monitoring
KW - attacker models
KW - fake sources approach
KW - original source location problem
KW - privacy optimal level
KW - single distributed eavesdropper attack
KW - source location privacy problem formalisation
KW - traffic analysis
KW - wireless sensor network applications
KW - Monitoring
KW - Position measurement
KW - Privacy
KW - Protocols
KW - Routing
KW - Wireless communication
KW - Wireless sensor networks
KW - Complexity
KW - Distributed Eavesdropper
KW - Fake Source
KW - Security
KW - Source Location Privacy
KW - Wireless Sensor Networks
U2 - 10.1109/TrustCom.2012.281
DO - 10.1109/TrustCom.2012.281
M3 - Conference contribution/Paper
SN - 9781467321723
SP - 760
EP - 768
BT - 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
PB - IEEE
ER -