Efficient spatial privacy preserving scheme for sensor network

The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

[1]  Duncan S. Wong,et al.  Linkable and Anonymous Signature for Ad Hoc Groups , 2004 .

[2]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[3]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[4]  Brijesh Kumar Chaurasia,et al.  Maximising anonymity of a vehicle , 2010, Int. J. Auton. Adapt. Commun. Syst..

[5]  Xiaodong Lin,et al.  TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[6]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[7]  Maxim Raya,et al.  Self-organized Anonymous Authentication in Mobile Ad Hoc Networks , 2009, SecureComm.

[8]  Joseph K. Liu,et al.  Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.

[9]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[10]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[11]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[12]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[13]  S. Verma,et al.  Maximizing anonymity of a vehicle , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.

[14]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[15]  Joseph K. Liu,et al.  Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.

[16]  Wenyuan Xu,et al.  Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[17]  Guihua Zeng,et al.  Improved Threshold Ring Signature for Ad-Hoc Group , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[18]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[19]  Wei-hong Wang,et al.  Design and implementation of an ECDSA-based identity authentication protocol on WSN , 2009, 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.

[20]  Mohamed Abid,et al.  RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.

[21]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[22]  Chunguang Ma,et al.  A survey of ring signature , 2008 .

[23]  Kui Ren,et al.  DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.

[24]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[25]  Joseph K. Liu,et al.  Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.

[26]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[27]  Zheng-hua Qi,et al.  An ID-based ring signcryption scheme for wireless sensor networks , 2010 .

[28]  Brijesh Kumar Chaurasia,et al.  Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks , 2009, Trans. Comput. Sci..

[29]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[30]  Young-Koo Lee,et al.  EDPPS: An Energy-efficient Data Privacy Protection Scheme for wireless sensor networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[31]  Jacques Stern,et al.  Threshold Ring Signatures for Ad-hoc Groups , 2002, CRYPTO 2002.