Advertisement

Preserving Receiver-Location Privacy in Wireless Sensor Networks

  • Javier Lopez
  • Ruben Rios
  • Jorge Cuellar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8434)

Abstract

Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the location of this critical device. This receiver-location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution

Keywords

Wireless sensor networks location privacy traffic analysis node capture 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 190–201. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  3. 3.
    Chen, H., Lou, W.: From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. In: 29th International Performance Computing and Communications Conference, IPCCC 2010, pp. 1–8. IEEE (2010)Google Scholar
  4. 4.
    Chen, X., Makki, K., Yen, K., Pissinou, N.: Node Compromise Modeling and its Applications in Sensor Networks. In: 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 575–582 (July 2007)Google Scholar
  5. 5.
    Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2(2), 159–186 (2006)CrossRefGoogle Scholar
  6. 6.
    Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: International Conference on Dependable Systems and Networks, DSN 2004, pp. 637–646. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  7. 7.
    Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 113–126 (2005)Google Scholar
  8. 8.
    Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34(3), 515–523 (2011)CrossRefGoogle Scholar
  9. 9.
    Eiben, A., Smith, J.: Introduction to Evolutionary Computing. Natural Computing, 2nd edn. Springer (2007)Google Scholar
  10. 10.
    Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955–1963 (2007)Google Scholar
  11. 11.
    Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7(10), 3769–3779 (2008)CrossRefGoogle Scholar
  12. 12.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)Google Scholar
  13. 13.
    Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: 27th International Conference on Distributed Computing Systems, ICDCS 2007, p. 23. IEEE Computer Society, Washington, DC (2007)Google Scholar
  14. 14.
    Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 88–93 (2004)Google Scholar
  15. 15.
    Proano, A., Lazos, L.: Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, April 17-19. ACM, Budapest (2013)Google Scholar
  16. 16.
    Rios, R., Cuellar, J., Lopez, J.: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 163–180. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  17. 17.
    Rios, R., Lopez, J.: Analysis of Location Privacy Solutions in Wireless Sensor Networks. IET Communications 5, 2518–2532 (2011)CrossRefGoogle Scholar
  18. 18.
    Vu, T.M., Safavi-Naini, R., Williamson, C.: Securing wireless sensor networks against large-scale node capture attacks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 112–123. ACM, New York (2010)Google Scholar
  19. 19.
    Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 1–11 (2012), doi:10.1007/s00779-012-0539-9Google Scholar
  20. 20.
    Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: 1st International Workshop on Security in Computers, Networking and Communications, pp. 1005–1010 (2011)Google Scholar
  21. 21.
    Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommunication Systems 52(4), 2163–2176 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Javier Lopez
    • 1
  • Ruben Rios
    • 1
  • Jorge Cuellar
    • 2
  1. 1.Network, Information and Computer Security (NICS) LabUniversidad of MálagaSpain
  2. 2.Siemens AGMunichGermany

Personalised recommendations