Abstract
Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the location of this critical device. This receiver-location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 190–201. Springer, Heidelberg (2011)
Chen, H., Lou, W.: From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. In: 29th International Performance Computing and Communications Conference, IPCCC 2010, pp. 1–8. IEEE (2010)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Node Compromise Modeling and its Applications in Sensor Networks. In: 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 575–582 (July 2007)
Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2(2), 159–186 (2006)
Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: International Conference on Dependable Systems and Networks, DSN 2004, pp. 637–646. IEEE Computer Society, Los Alamitos (2004)
Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 113–126 (2005)
Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34(3), 515–523 (2011)
Eiben, A., Smith, J.: Introduction to Evolutionary Computing. Natural Computing, 2nd edn. Springer (2007)
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955–1963 (2007)
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7(10), 3769–3779 (2008)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)
Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: 27th International Conference on Distributed Computing Systems, ICDCS 2007, p. 23. IEEE Computer Society, Washington, DC (2007)
Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 88–93 (2004)
Proano, A., Lazos, L.: Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, April 17-19. ACM, Budapest (2013)
Rios, R., Cuellar, J., Lopez, J.: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 163–180. Springer, Heidelberg (2012)
Rios, R., Lopez, J.: Analysis of Location Privacy Solutions in Wireless Sensor Networks. IET Communications 5, 2518–2532 (2011)
Vu, T.M., Safavi-Naini, R., Williamson, C.: Securing wireless sensor networks against large-scale node capture attacks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 112–123. ACM, New York (2010)
Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 1–11 (2012), doi:10.1007/s00779-012-0539-9
Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: 1st International Workshop on Security in Computers, Networking and Communications, pp. 1005–1010 (2011)
Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommunication Systems 52(4), 2163–2176 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Lopez, J., Rios, R., Cuellar, J. (2014). Preserving Receiver-Location Privacy in Wireless Sensor Networks. In: Huang, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2014. Lecture Notes in Computer Science, vol 8434. Springer, Cham. https://doi.org/10.1007/978-3-319-06320-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-06320-1_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06319-5
Online ISBN: 978-3-319-06320-1
eBook Packages: Computer ScienceComputer Science (R0)