Home > Research > Publications & Outputs > Towards Understanding Source Location Privacy i...

Links

Text available via DOI:

View graph of relations

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. / Jhumka, Arshad; Bradbury, Matthew; Leeke, Matthew.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2012. p. 760-768.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Jhumka, A, Bradbury, M & Leeke, M 2012, Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, pp. 760-768. https://doi.org/10.1109/TrustCom.2012.281

APA

Jhumka, A., Bradbury, M., & Leeke, M. (2012). Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 760-768). IEEE. https://doi.org/10.1109/TrustCom.2012.281

Vancouver

Jhumka A, Bradbury M, Leeke M. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. 2012. p. 760-768 Epub 2012 Jun 25. doi: 10.1109/TrustCom.2012.281

Author

Jhumka, Arshad ; Bradbury, Matthew ; Leeke, Matthew. / Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2012. pp. 760-768

Bibtex

@inproceedings{ab9ef1020a6f499abcb328bf19e602cb,
title = "Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources",
abstract = "Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.",
keywords = "computational complexity, data privacy, telecommunication security, wireless sensor networks, NP-complete problem, asset monitoring, attacker models, fake sources approach, original source location problem, privacy optimal level, single distributed eavesdropper attack, source location privacy problem formalisation, traffic analysis, wireless sensor network applications, Monitoring, Position measurement, Privacy, Protocols, Routing, Wireless communication, Wireless sensor networks, Complexity, Distributed Eavesdropper, Fake Source, Security, Source Location Privacy, Wireless Sensor Networks",
author = "Arshad Jhumka and Matthew Bradbury and Matthew Leeke",
year = "2012",
month = sep,
day = "6",
doi = "10.1109/TrustCom.2012.281",
language = "English",
isbn = "9781467321723",
pages = "760--768",
booktitle = "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

AU - Jhumka, Arshad

AU - Bradbury, Matthew

AU - Leeke, Matthew

PY - 2012/9/6

Y1 - 2012/9/6

N2 - Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.

AB - Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.

KW - computational complexity

KW - data privacy

KW - telecommunication security

KW - wireless sensor networks

KW - NP-complete problem

KW - asset monitoring

KW - attacker models

KW - fake sources approach

KW - original source location problem

KW - privacy optimal level

KW - single distributed eavesdropper attack

KW - source location privacy problem formalisation

KW - traffic analysis

KW - wireless sensor network applications

KW - Monitoring

KW - Position measurement

KW - Privacy

KW - Protocols

KW - Routing

KW - Wireless communication

KW - Wireless sensor networks

KW - Complexity

KW - Distributed Eavesdropper

KW - Fake Source

KW - Security

KW - Source Location Privacy

KW - Wireless Sensor Networks

U2 - 10.1109/TrustCom.2012.281

DO - 10.1109/TrustCom.2012.281

M3 - Conference contribution/Paper

SN - 9781467321723

SP - 760

EP - 768

BT - 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

PB - IEEE

ER -