Advertisement

Event Handoff Unobservability in WSN

  • Stefano Ortolani
  • Mauro Conti
  • Bruno Crispo
  • Roberto Di Pietro
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6555)

Abstract

The open nature of communications in Wireless Sensor Networks (WSNs) makes it easy for an adversary to trace all the communications within the network. If techniques such as encryption may be employed to protect data privacy (i.e. the content of a message), countermeasures to deceive context privacy (e.g. the source of a message) are much less straightforward. In recent years, the research community addressed the problem of context privacy. Some work aimed to hide the position of the collecting node. Other work investigated on hiding the position of an event—sensed by the WSN. However, the solutions proposed for events hiding either: (i) considered only static events; (ii) are not efficient. In this work, we describe open issues that we identified in the current research. In particular, we consider the problem of efficiently hiding mobile events.

References

  1. 1.
    Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), pp. 51–55 (2008)Google Scholar
  2. 2.
    Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 1501–1514 (2009)CrossRefGoogle Scholar
  3. 3.
    He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 2045–2053 (2007)Google Scholar
  4. 4.
    Conti, M., Zhang, L., Roy, S., Di Pietro, R., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2, 195–213 (2009)CrossRefGoogle Scholar
  5. 5.
    Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), pp. 77–88 (2006)Google Scholar
  6. 6.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)Google Scholar
  7. 7.
    Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88–93 (2004)Google Scholar
  8. 8.
    Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, p. 202. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955–1963 (2007)Google Scholar
  10. 10.
    Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), pp. 314–323 (2007)Google Scholar
  11. 11.
    Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec 2008), pp. 77–88 (2008)Google Scholar
  12. 12.
    Ouyang, Y., Le, Z., Liu, D., Ford, J., Makedon, F.: Source location privacy against laptop-class attacks in sensor networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), pp. 1–10 (2008)Google Scholar
  13. 13.
    Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source location privacy: Analysis and countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 19, pp. 373–393. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing anonymity in wireless sensor networks. In: IEEE International Conference on Pervasive Services, pp. 145–148 (2007)Google Scholar
  15. 15.
    Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 184–188. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems 10, 557–570 (2002)MathSciNetCrossRefGoogle Scholar
  17. 17.
    von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 122–130 (2003)Google Scholar
  18. 18.
    Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5, 128–143 (2006)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Stefano Ortolani
    • 1
  • Mauro Conti
    • 1
  • Bruno Crispo
    • 2
  • Roberto Di Pietro
    • 3
  1. 1.Vrije UniversiteitAmsterdamThe Netherlands
  2. 2.University of TrentoTrentoItaly
  3. 3.Università di Roma TreRomeItaly

Personalised recommendations