Abstract

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

Highlights

  • Wireless sensor networks (WSNs) consist of many hosts called sensor nodes (SNs)

  • In order to protect the panda from hunters or adversaries (ADVs), we need to implement in place an efficient source location privacy scheme (SLP)

  • We conclude of these simulations that the performance of energy controlled anti temporal (ECAT) is better than simple global anti temporal (SGAT) while it continues to provide a good temporal privacy

Read more

Summary

Introduction

A wireless sensor device is a simple autonomous host device. It can sense a phenomenon, convert the sensed information into a form of data, process the data and transmit the data to a sink or a base-station (BS) for further usage or analysis. In order to protect the panda from hunters or adversaries (ADVs), we need to implement in place an efficient source location privacy scheme (SLP). In such a scenario, location privacy is much more important than the confidentiality of the sensed data itself. Base-station location privacy (BLP) is very crucial for every WSN since it aggregates all the data

Problem Statement
Background and Literature Survey
Pre-Deployment Phase
Setup Phase
Creating Pseudonyms
Deleting Security Information
Communication Phase
Transmission as a Sensor
Transmission as a Forwarder
Transmission as a Broadcaster
Limited Broadcast Messages
Fake Broadcast Message
SN Removal
SN Addition
Contribution of Anonymity Module
Module II
Module III
Security Analysis
Delivery Time
Energy Cost
Changing i from Fixed to Variable
Reducing the Amount of Fake Messages and Delay for Real Messages
Energy Conservation by Forwarding Messages to Energy-Rich SNs
Handling Rate Attack
Contribution of Temporal and Rate Privacy Module
Anonymity and Security Analysis
Security against Passive Attacks
Security against Active Attacks
Soft-Active Attacks
Hard-Active Attacks
Sink Security
Link Anonymity
Routing Privacy
Data Privacy
SLP and BLP
Performance Evaluation
Transmission Rate Privacy
Storage Evaluation
Processing and Computational Evaluation
Findings
10. Conclusions and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.