Improving source-location privacy through opportunistic routing in wireless sensor networks

Wireless sensor networks (WSN) can be an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when a network is deployed to monitor sensitive objects. In order to enhance source location privacy in sensor networks, we propose the use of an opportunistic mesh networking scheme and examine four different approaches. Each approach has different selection criteria for the next relay node. In opportunistic mesh networks, each sensor transmits the packet over a dynamic path to the destination. Every packet from the source can therefore follow a different path toward the destination, making it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication.

[1]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[2]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[3]  John G. Proakis,et al.  Digital Communications , 1983 .

[4]  Jian Ren,et al.  Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[5]  Guangjun Wen,et al.  Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[6]  Leonidas Kazatzopoulos,et al.  iHIDE: hiding sources of information in WSNs , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[7]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[8]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[9]  Yun Li,et al.  Routing-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[10]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.

[11]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[12]  Jian Ren,et al.  Routing-based source-location privacy protection in wireless sensor networks , 2009, 2009 IEEE International Conference on Electro/Information Technology.

[13]  Dimitrios Hatzinakos,et al.  Real-Time Communications in Large-Scale Wireless Networks , 2008, Int. J. Digit. Multim. Broadcast..