Fake source‐based source location privacy in wireless sensor networks

The development of novel wireless sensor network (WSN) applications, such as asset monitoring, has led to novel reliability requirements. One such property is source location privacy (SLP). The original SLP problem is to protect the location of a source node in a WSN from a single distributed eavesdropper attacker. Several techniques have been proposed to address the SLP problem, and most of them use some form of traffic analysis and engineering to provide enhanced SLP. The use of fake sources is considered to be promising for providing SLP, and several works have investigated the effectiveness of the fake sources approach under various attacker models. However, very little work has been done to understand the theoretical underpinnings of the fake source technique. In this paper, we (i) provide a novel formalisation of the fake sources selection problem; (ii) prove the fake sources selection problem to be NP‐complete; (iii) provide parametric heuristics for three different network configurations; and (iv) show that these heuristics provide (near) optimal levels of SLP under appropriate parameterisation. Our results show that fake sources can provide a high level of SLP. Our work is the first to investigate the theoretical underpinnings of the fake source technique. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Seung-Woo Seo,et al.  Source-Location Privacy in Wireless Sensor Networks , 2007 .

[2]  Fillia Makedon,et al.  Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.

[3]  Amy L. Murphy,et al.  Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[4]  Guangjun Wen,et al.  Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[5]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[6]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[7]  Gwillerm Froc,et al.  Random walk based routing protocol for wireless sensor networks , 2007, ValueTools '07.

[8]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[9]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[10]  Sandeep S. Kulkarni,et al.  Self-stabilizing Deterministic TDMA for Sensor Networks , 2005, ICDCIT.

[11]  Sébastien Tixeuil,et al.  Discovering Network Topology in the Presence of Byzantine Faults , 2006, IEEE Transactions on Parallel and Distributed Systems.

[12]  Giacomo Morabito,et al.  Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.

[13]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[14]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[15]  Arshad Jhumka,et al.  Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[16]  Francesco Palmieri,et al.  Condensation-based routing in mobile ad-hoc networks , 2012, Mob. Inf. Syst..

[17]  Arshad Jhumka,et al.  On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..

[18]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[19]  Hong Shen,et al.  Random Walk Routing in WSNs with Regular Topologies , 2006, Journal of Computer Science and Technology.

[20]  Gerhard Maierbacher,et al.  Low-complexity coding and source-optimized clustering for large-scale sensor networks , 2008, TOSN.

[21]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[22]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.