On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy

Wireless sensor networks have enabled novel applications such as monitoring, where security is invariably a requirement. One aspect of security, namely source location privacy, is becoming an increasingly important property of some wireless sensor network applications. The fake source technique has been proposed as an efficient technique to handle the source location privacy problem. However, there are several factors that limit the usefulness of current results: (i) the selection of fake sources is dependent on sophisticated nodes, (ii) fake sources are known a priori and (iii) the selection of fake sources is based on a prohibitively expensive pre-configuration phase. In this paper, we investigate the privacy enhancement and energy efficiency of different implementations of the fake source technique that circumvents these limitations. Our results show that the fake source technique is indeed effective in enhancing privacy. Specifically, one implementation achieves near-perfect privacy when there is at least one fake source in the network, at the expense of increased energy consumption. In the presence of multiple attackers, the same implementation yields only a 30% decrease in capture ratio with respect to flooding. To address this problem, we propose a hybrid technique which achieves a corresponding 50% reduction in the capture ratio and a near-perfect privacy whenever at least one fake source exists in the network.

[1]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[2]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[3]  Felix C. Freiling,et al.  Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .

[4]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[5]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[6]  Arshad Jhumka,et al.  Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[7]  Fillia Makedon,et al.  Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.

[8]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[9]  Guangjun Wen,et al.  Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[10]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[11]  Seung-Woo Seo,et al.  Source-Location Privacy in Wireless Sensor Networks , 2007 .

[12]  Yeonghwan Tscha Routing for enhancing source-location privacy in wireless sensor networks of multiple assets , 2009, Journal of Communications and Networks.

[13]  Volkan Isler,et al.  Triangulation Based Multi Target Tracking with Mobile Sensor Networks , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[14]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[15]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Giacomo Morabito,et al.  Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.

[17]  Jian Ren,et al.  Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.

[18]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.