7,087 research outputs found
A novel routing approach for source location privacy in wireless sensor networks
Wireless sensor networks (WSNs) allows the world to use a technology for event
supervision for several applications like military and civilian applications. Network
privacy remained a prime concern in WSNs. Privacy of Source location is
assumed to be one of the main un-tackled issues in privacy ofWSNs. Privacy of the
source location is vital and highly jeopardized with the use of wireless communications.
For WSNs, privacy of source location is become more complex by the fact
that sensor nodes are low cost and energy efficient radio devices. So, use of computation
intensive encryption methods and large scale broadcasting based algorithms
are found to be unsuitable for WSNs. Several schemes have been proposed to ensure
privacy of source location in WSNs. But, most of existing schemes depends
on public-key cryptosystems, while others are either energy inefficient or have certain
security flaws like leakage of information using directional attacks or traffic
analysis attacks.
In this thesis, we propose a novel dynamic routing based approach for preserving
privacy of source location in WSNs, which injects fake packets in network
and switches the real packet information among different routing patterns. It addresses
the privacy of source location by considering the limited features of WSNs.
Major contributions of this work includes two aspects. Firstly, different from the
existing approaches, the proposed approach considers enhancing the security of
nodes with minimal transmission delay and consumes power with minimum effect
on the lifetime of the network. Secondly, the proposed approach is designed
to defend many attacks like hop by hop, directional attacks by choosing a suitable
path to send information from node to BS dynamically without affecting network
life significantly. Thus, it becomes difficult for the attacker to find the exact path,
and hence the original location of node. The proposed approach is implemented
and validated by comparing its results with that of the existing approaches in the
field of source location privacy in terms of Power consumption, Transmission delay,
Safety period, and network lifetime. The analysis of comparative results indicates
that the proposed approach is superior to the existing approaches in preserving the
source location privacy
On the tradeoff between privacy and energy in wireless sensor networks
Source location privacy is becoming an increasingly important property of some wireless sensor network applica- tions. The fake source technique has been proposed as an approach for handling the source location privacy problem in these situations. However, whilst the efficiency of the fake source techniques is well documented, there are several factors that limit the usefulness of current results: (i) the assumption that fake sources are known a priori, (ii) the selection of fake sources based on an prohibitively expensive pre-configuration phase and (iii) the lack of a commonly adopted attacker model. In this paper we address these limitations by investigating the efficiency of the fake source technique with respect to possible implementations, configurations and extensions that do not require a pre-configuration phase or a priori knowledge of fake sources. The results presented demonstrate that one possible implementation, in presence of a single attacker, can lead to a decrease in capture ratio of up to 60% when compared with a flooding baseline. In the presence of multiple attackers, the same implementation yields only a 30% decrease in capture ratio with respect to the same baseline. To address this problem we investigate a hybrid technique, known as phantom routing with fake sources, which achieves a corresponding 50% reduction in capture ratio
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)
open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privac
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
Decentralized systems are a subset of distributed systems where multiple
authorities control different components and no authority is fully trusted by
all. This implies that any component in a decentralized system is potentially
adversarial. We revise fifteen years of research on decentralization and
privacy, and provide an overview of key systems, as well as key insights for
designers of future systems. We show that decentralized designs can enhance
privacy, integrity, and availability but also require careful trade-offs in
terms of system complexity, properties provided, and degree of
decentralization. These trade-offs need to be understood and navigated by
designers. We argue that a combination of insights from cryptography,
distributed systems, and mechanism design, aligned with the development of
adequate incentives, are necessary to build scalable and successful
privacy-preserving decentralized systems
Maintaining trajectory privacy in mobile wireless sensor networks
Mobile wireless sensor networks (MWSN) is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes. The proposed scheme is based on random distribution of data packets. Moreover, sensor nodes do not use location information of the mobile sink or its trajectory. We performed simulation based and analytical performance evaluations for the proposed scheme. The results show that a network with up to 99% data delivery rate can be obtained by appropriate configuration while maintaining a fair level of trajectory privacy of the mobile sink node
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
- âŠ