A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks

Wireless sensor networks (WSNs) are commonly used in asset monitoring applications, where it is often desirable for the location of the asset being monitored to be kept private. The source location privacy (SLP) problem involves protecting the location of a WSN source node from an attacker who is attempting to locate it. Among the most promising approaches to the SLP problem is the use of fake sources, with much existing research demonstrating their efficacy. Despite the effectiveness of the approach, the most effective algorithms providing SLP require network and situational knowledge that makes their deployment impractical in many contexts. In this paper, we develop a novel dynamic fake sources-based algorithm for SLP. We show that the algorithm provides state-of-the-art levels of location privacy under practical operational assumptions.

[1]  Arshad Jhumka,et al.  Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[2]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[3]  Ke Xu,et al.  An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.

[4]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[5]  田慧,et al.  Random Walk Routing in WSNs with Regular Topologies , 2006 .

[6]  Honglong Chen,et al.  From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.

[7]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[8]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[9]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[10]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[11]  Arshad Jhumka,et al.  A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks , 2015, TrustCom 2015.

[12]  Gwillerm Froc,et al.  Random walk based routing protocol for wireless sensor networks , 2007, ValueTools '07.

[13]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[14]  Arshad Jhumka,et al.  On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..

[15]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[16]  Jie Gao,et al.  Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.

[17]  Guangjun Wen,et al.  Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[18]  Yunhao Liu,et al.  End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[19]  Seung-Woo Seo,et al.  Source-Location Privacy in Wireless Sensor Networks , 2007 .

[20]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[21]  Yik-Chung Wu,et al.  Clock Synchronization of Wireless Sensor Networks , 2011, IEEE Signal Processing Magazine.

[22]  Mianxiong Dong,et al.  Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.

[23]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[24]  Arshad Jhumka,et al.  Fake source‐based source location privacy in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[25]  Fillia Makedon,et al.  Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.

[26]  Giacomo Morabito,et al.  Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks , 2007, Networking.

[27]  Sébastien Tixeuil,et al.  Discovering Network Topology in the Presence of Byzantine Faults , 2006, IEEE Transactions on Parallel and Distributed Systems.

[28]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[29]  Francesco Palmieri,et al.  Condensation-based routing in mobile ad-hoc networks , 2012, Mob. Inf. Syst..

[30]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.