Hybrid online protocols for source location privacy in wireless sensor networks

Abstract Wireless sensor networks (WSNs) will form the building blocks of many novel applications such as asset monitoring. These applications will have to guarantee that the location of the occurrence of specific events is kept private from attackers, in what is called the source location privacy (SLP) problem. Fake sources have been used in numerous techniques, however, the solution’s efficiency is typically achieved by fine-tuning parameters at compile time. This is undesirable as WSN conditions may change. In this paper, we first present an SLP algorithm – Dynamic  – that estimates the relevant parameters at runtime and show that it provides a high level of SLP, albeit at the expense of a high number of messages. To address this, we provide a hybrid online algorithm – DynamicSPR  – that uses directed random walks for the fake sources allocation strategy to reduce energy usage. We perform simulations of the various protocols we present and our results show that DynamicSPR provides a similar level of SLP as when parameters are optimised at compile-time, with a lower number of messages sent.

[1]  Alina-Mihaela Badescu,et al.  A wireless sensor network to monitor and protect tigers in the wild , 2015 .

[2]  Felix C. Freiling,et al.  Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .

[3]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[4]  Riccardo Bettati,et al.  On countermeasures to traffic analysis attacks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[5]  Arshad Jhumka,et al.  Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Roberto Gorrieri,et al.  Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.

[7]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[8]  Arshad Jhumka,et al.  On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy , 2011, Comput. J..

[9]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[10]  Mauro Conti,et al.  Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[11]  Mohamed F. Younis,et al.  Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor Network , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[12]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[13]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[14]  Yi Sun,et al.  A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs , 2015, SAC.

[15]  Matthew Bradbury,et al.  Towards fake sources for source location privacy in wireless sensor networks with multiple sources , 2016, 2016 IEEE International Conference on Communication Systems (ICCS).

[16]  Jie Gao,et al.  Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.

[17]  Lin Yao,et al.  Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[18]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[19]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[20]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[21]  Cecilia Mascolo,et al.  WILDSENSING , 2012, ACM Trans. Sens. Networks.

[22]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[23]  Abdul Hanan Abdullah,et al.  Isolated Adversary Zone for source location privacy in Wireless Sensor Networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[24]  Arshad Jhumka,et al.  Deconstructing source location privacy-aware routing protocols , 2017, SAC.

[25]  Arshad Jhumka,et al.  A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[26]  Jian Ren,et al.  STaR: design and quantitative measurement of source-location privacy for wireless sensor networks , 2016, Secur. Commun. Networks.

[27]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[28]  Philip Levis,et al.  CTP , 2013, ACM Trans. Sens. Networks.

[29]  Arshad Jhumka,et al.  A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[30]  Ke Xu,et al.  An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.

[31]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[32]  JeongGil Ko,et al.  Industry: beyond interoperability: pushing the performance of sensor network IP stacks , 2011, SenSys.

[33]  Arshad Jhumka,et al.  Understanding source location privacy protocols in sensor networks via perturbation of time series , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[34]  JhumkaArshad,et al.  Fake source-based source location privacy in wireless sensor networks , 2015 .

[35]  Javier López,et al.  Location Privacy in WSNs: Solutions, Challenges, and Future Trends , 2013, FOSAD.

[36]  Mianxiong Dong,et al.  Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[37]  Anis Koubaa,et al.  Radio link quality estimation in wireless sensor networks , 2012, ACM Trans. Sens. Networks.

[38]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[39]  Petros Spachos,et al.  Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[40]  Weijia Jia,et al.  A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.

[41]  Liang Chen,et al.  A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, International Conference on Intelligent Cloud Computing.

[42]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[43]  Hongwei Zhang,et al.  Reliable bursty convergecast in wireless sensor networks , 2005, MobiHoc '05.

[44]  Xu Chen,et al.  A Novel Source-Location Anonymity Protocol in Surveillance Systems , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[45]  Yunhao Liu,et al.  End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[46]  Honglong Chen,et al.  On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..

[47]  Prabhat Kumar,et al.  Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks , 2015 .

[48]  Heejo Lee,et al.  Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.

[49]  Chin-Tser Huang,et al.  PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers , 2013, 2013 Proceedings IEEE INFOCOM.

[50]  Hongwei Zhang,et al.  Reliable bursty convergecast in wireless sensor networks , 2007, Comput. Commun..

[51]  Yik-Chung Wu,et al.  Clock Synchronization of Wireless Sensor Networks , 2011, IEEE Signal Processing Magazine.

[52]  Miao Xu,et al.  Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.

[53]  Paolo Palmieri Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks , 2015, ICICS.

[54]  Mianxiong Dong,et al.  Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.

[55]  Ling Li,et al.  Random selection false source-based algorithm for protecting source-location privacy in WSNs , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).

[56]  Arshad Jhumka,et al.  Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks , 2015, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC).

[57]  Arshad Jhumka,et al.  Fake source‐based source location privacy in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[58]  M. P. Singh,et al.  Source location privacy using multiple-phantom nodes in WSN , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.