An experimental comparison of source location privacy methods for power optimization in WSNs

Wireless sensor technology may be envisioned as the promising substitute of traditional collaborative distributed schemes, especially for monitoring applications. However, the widespread adoption of such technology is being slowed down because of growing security concerns, specially critical in stationary sensor topologies which create new threats to the privacy of individuals and organizations. As a countermeasure against source observability and traceability, several source-location privacy solutions have been presented so far. The goal of this paper is twofold. We present an experimental comparison of the energy consumption of existing strategies (i.e. Flooding, Phantom and Fake Routing) as well as proposing a novel energy-aware approach aimed at disguising the real source in the presence of a global eavesdropper. A major finding of this preliminary work is that source anonymity is reached with minimum consumption.

[1]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[2]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[3]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[4]  Ahmad Khonsari,et al.  Source Location Anonymity for Sensor Networks , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[5]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[6]  Yurong Xu,et al.  Providing Anonymity in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.

[7]  Xiuzhen Cheng,et al.  Localized Flooding Backbone Construction for Location Privacy in Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[8]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[9]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[10]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[11]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[12]  Marco Gruteser,et al.  USENIX Association , 1992 .

[13]  Jian Ren,et al.  Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.

[14]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[15]  Stephan Olariu,et al.  On providing anonymity in wireless sensor networks , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..

[16]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[17]  Anne-Marie Kermarrec,et al.  Lightweight probabilistic broadcast , 2003, TOCS.

[18]  Athanassios Boulis,et al.  Castalia: revealing pitfalls in designing distributed algorithms in WSN , 2007, SenSys '07.

[19]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[20]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.