3 research outputs found

    An improved packet forwarding approach for source location privacy in wireless sensor networks

    No full text
    Privacy is one of the major concerns in dealing with information, either transmission or storage. The adversaries attempt to launch the variety of attacks against a system to capture their needed information. Sometimes content of information is their target and other times the context of information such as timing and location can be the aim of the attack. The wireless sensors network is established based on affairs related to information. Depending on the application of this type of networks, different security considerations should be taken. This research focuses on the source location privacy where the attacker tries to discover the origin sender of packets to achieve the under monitor assets by backtracking the received signals. The final aim is improving the safety period for source node and it means the prolonging the discovering duration of the exact location of source node for adversary. This study concentrates on solutions based on random walk method as a core technique and tries to present an idea to improve the results. The proposed approach named Isolated Adversary Zone is a solution for packet forwarding within wireless sensor network. In this study some of the existing methods are investigated in terms of safety period. These solutions have been implemented by simulating in MATLAB. From this knowledge, the author proposes a packet forwarding approach which can improve the safety period for source node. The proposed approach is tested and some future works are suggested at the end of this stud

    An improved packet forwarding approach for source location privacy in wireless sensors network

    Get PDF
    Privacy is one of the major concerns in dealing with information, either transmission or storage. The adversaries attempt to launch the variety of attacks against a system to capture their needed information. Sometimes content of information is their target and other times the context of information such as timing and location can be the aim of the attack. The wireless sensors network is established based on affairs related to information. Depending on the application of this type of networks, different security considerations should be taken. This research focuses on the source location privacy where the attacker tries to discover the origin sender of packets to achieve the under monitor assets by backtracking the received signals. The final aim is improving the safety period for source node and it means the prolonging the discovering duration of the exact location of source node for adversary. This study concentrates on solutions based on random walk method as a core technique and tries to present an idea to improve the results. The proposed approach named Isolated Adversary Zone is a solution for packet forwarding within wireless sensor network. In this study some of the existing methods are investigated in terms of safety period. These solutions have been implemented by simulating in MATLAB. From this knowledge, the author proposes a packet forwarding approach which can improve the safety period for source node. The proposed approach is tested and some future works are suggested at the end of this study

    Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack

    No full text
    Smart home technologies have attracted more users in recent years due to significant advancements in their underlying enabler components, such as sensors, actuators, and processors, which are spreading in various domains and have become more affordable. However, these IoT-based solutions are prone to data leakage; this privacy issue has motivated researchers to seek a secure solution to overcome this challenge. In this regard, wireless signal eavesdropping is one of the most severe threats that enables attackers to obtain residents’ sensitive information. Even if the system encrypts all communications, some cyber attacks can still steal information by interpreting the contextual data related to the transmitted signals. For example, a “fingerprint and timing-based snooping (FATS)” attack is a side-channel attack (SCA) developed to infer in-home activities passively from a remote location near the targeted house. An SCA is a sort of cyber attack that extracts valuable information from smart systems without accessing the content of data packets. This paper reviews the SCAs associated with cyber–physical systems, focusing on the proposed solutions to protect the privacy of smart homes against FATS attacks in detail. Moreover, this work clarifies shortcomings and future opportunities by analyzing the existing gaps in the reviewed methods
    corecore