skip to main content
10.1145/2462096.2462112acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Perfect contextual information privacy in WSNs undercolluding eavesdroppers

Published: 17 April 2013 Publication History

Abstract

We address the problem of preserving contextual information privacy in wireless sensor networks (WSNs). We consider an adversarial network of colluding eavesdroppers that are placed at unknown locations. Eavesdroppers use communication attributes of interest such as packet sizes, inter-packet timings, and unencrypted headers to infer contextual information, including the time and location of events reported by sensors, the sink's position, and the event type. We propose a traffic normalization technique that employs a minimum backbone set of sensors to decorrelate the observable traffic patterns from the real ones. Compared to previous works, our method significantly reduces the communication overhead for normalizing traffic patterns.

References

[1]
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran. Statistical framework for source anonymity in sensor networks. In Proc. of the GLOBECOM Conference, pages 1--6, 2010.
[2]
K. Alzoubi, P. Wan, and O. Frieder. New distributed algorithm for connected dominating set in wireless ad hoc networks. In Proc. of the 35th Annual Hawaii International Conference on System Sciences, pages 3849--3855, 2002.
[3]
X. Cheng and D.-Z. Du. Virtual backbone-based routing in multihop ad hoc wireless networks. Technical report, University of Minnesota, 2002.
[4]
J. Deng, R. Han, and S. Mishra. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, pages 159--186, 2006.
[5]
M. Garey and D. Johnson. Computers and intractability. Freeman San Francisco, CA, 1979.
[6]
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proc. of the ACM MobiSys Conference, pages 40--53, 2008.
[7]
J. Gross and J. Yellen. Handbook of graph theory. CRC, 2004.
[8]
J. Kong and X. Hong. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc network. In Proc. of the MOBIHOC Conference, pages 291--302, 2003.
[9]
K. Mehta, D. Liu, and M. Wright. Location privacy in sensor networks against a global eavesdropper. In Proc. of the IEEE International Conference on Network Protocols, pages 314--323, 2007.
[10]
A. Proano and L. Lazos. Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing, 9(1):101--114, 2012.
[11]
A. Proano and L. Lazos. Hiding contextual information in WSNs. In Proc. of the IEEE WoWMoM Symposium, pages 1--6, 2012.
[12]
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In Proc. of the 27th Conference on Computer Communications, pages 464--474, 2008.
[13]
M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Short paper: reactive jamming in wireless networks: how realistic is the threat? In Proc. of the ACM WiSec Conference, pages 47--52, 2011.
[14]
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In Proc. ACM Wisec, pages 77--88, 2008.

Cited By

View all
  • (2023)BSLPSDN: Base station location privacy via software‐defined networking (SDN) in wireless sensor networksInternational Journal of Communication Systems10.1002/dac.560136:17Online publication date: 17-Aug-2023
  • (2020)Temporal Differential Privacy in Wireless Sensor NetworksJournal of Network and Computer Applications10.1016/j.jnca.2020.102548155:COnline publication date: 1-Apr-2020
  • (2017)MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor NetworksJournal of Computer Science and Technology10.1007/s11390-017-1777-032:5(991-1007)Online publication date: 20-Sep-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
April 2013
230 pages
ISBN:9781450319980
DOI:10.1145/2462096
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 April 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. eavesdropping
  2. privacy
  3. security
  4. wireless sensor networks

Qualifiers

  • Research-article

Conference

WISEC'13
Sponsor:

Acceptance Rates

WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)BSLPSDN: Base station location privacy via software‐defined networking (SDN) in wireless sensor networksInternational Journal of Communication Systems10.1002/dac.560136:17Online publication date: 17-Aug-2023
  • (2020)Temporal Differential Privacy in Wireless Sensor NetworksJournal of Network and Computer Applications10.1016/j.jnca.2020.102548155:COnline publication date: 1-Apr-2020
  • (2017)MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor NetworksJournal of Computer Science and Technology10.1007/s11390-017-1777-032:5(991-1007)Online publication date: 20-Sep-2017
  • (2016)Lpsdn: Sink-Node Location Privacy in WSNs via SDN Approach2016 IEEE International Conference on Networking, Architecture and Storage (NAS)10.1109/NAS.2016.7549407(1-10)Online publication date: Aug-2016
  • (2014)Location Privacy in WSNs: Solutions, Challenges, and Future TrendsFoundations of Security Analysis and Design VII10.1007/978-3-319-10082-1_9(244-282)Online publication date: 2014
  • (2014)Preserving Receiver-Location Privacy in Wireless Sensor NetworksProceedings of the 10th International Conference on Information Security Practice and Experience - Volume 843410.1007/978-3-319-06320-1_3(15-27)Online publication date: 5-May-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media