Cluster based Location privacy in Wireless Sensor Networks against a universal adversary

Even though a lot security is given in the wireless sensor networks yet the information is being exposed. Such information can then used by the adversary for the attack. The existing privacy techniques defend against a local adversary. There are two main categories of privacy preservation in Wireless Sensor Networks. They are data privacy and the context privacy. In this paper, we describe Location privacy. Location privacy is extremely important in Wireless Sensor Networks. Information on location of events or on location of base stations can be of a primary concern of adversary. Location privacy is very important in hostile environments. It is sufficient for the adversary to find out location of sensors currently monitoring the location of the source to successfully localize and capture the source. Similarly, the adversary only needs to find out location of the base station to be able to mount a physical or other DoS attack on the base station and thus inactivate the whole network. In this paper, they are two main categories of privacy preserving techniques for Wireless sensor network that have been presented, data-oriented and context-oriented. So different techniques against a universal adversary with respect to context privacy are discussed. The paper presents recurrent clustering mechanism.

[1]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[2]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[3]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[4]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[5]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[8]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[9]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[10]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.