Abstract

Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.

Highlights

  • A wireless sensor node (SN) is a simple autonomous host device

  • The scheme presented in this work provides source, link, and base station (BS) anonymity, SLP and BSLP

  • The global adversary needs to see a maze of transmissions happening all over the network

Read more

Summary

Introduction

A wireless sensor node (SN) is a simple autonomous host device. It can sense a phenomenon, convert the sensed information into data, process the data, and transmit the data to a base station (BS) for further analysis. When a sensor node detects a Panda in a certain area, it should report the data via a message to the BS. In order to protect the Panda from the ADV, we need to implement in place an efficient source location privacy scheme (SLP). As well, to provide location privacy for the BS (BSLP), which is the data aggregator and the controller of the WSN. The solution needs to provide anonymity where the ADV cannot know the identity of the SNs. We have to reduce the capture likelihood and increase safety period. Applying regular privacy and security algorithms might not be suitable for such networks

Problem Statement
Background and Literature Survey
Preliminaries
Proposed Anonymous Model
Security Analysis
Performance Evaluation
Conclusions and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.