skip to main content
10.1145/3132114.3132120acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

An Efficient Source Anonymity Technique based on Exponential Distribution against a Global Adversary Model using Fake Injections

Published: 21 November 2017 Publication History

Abstract

The security of Wireless Sensor Networks (WSNs) is vital in several applications such as the tracking and monitoring of endangered species such as pandas in a national park or soldiers in a battlefield. This kind of applications requires the anonymity of the source, known as Source Location Privacy (SLP). The main aim is to prevent an adversary from tracing back a real event to the originator by analyzing the network traffic. Previous techniques have achieved high anonymity such as Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD). However, these techniques increase the overall overhead of the network. To overcome this shortcoming, a new technique is presented: Exponential Dummy Adaptive Distribution (EDAD). In this technique, an exponential distribution is used instead of the uniform distribution to reduce the overhead without sacrificing the anonymity of the source. The exponential distribution improves the lifetime of the network since it decreases the number of transmitted packets within the network. It is straightforward and easy to implement because it has only one parameter λ that controls the transmitting rate of the network nodes. The conducted adversary model is global, which has a full view of the network and is able to perform sophisticated attacks such as rate monitoring and time correlation. The simulation results show that the proposed technique provides less overhead and high anonymity with reasonable delay and delivery ratio. Three different analysis models are developed to confirm the validation of our technique. These models are visualization model, a neural network model, and a steganography model.

References

[1]
Pathan, A.-S.K., H.-W. Lee, and C.S. Hong. Security in wireless sensor networks: issues and challenges. in Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. 2006. IEEE.
[2]
Dargie, W.W. and C. Poellabauer, Fundamentals of wireless sensor networks: theory and practice. 2010: John Wiley & Sons.
[3]
Abuzneid, A.-s., T. Sobh, and M. Faezipour. An enhanced communication protocol for anonymity and location privacy in WSN. in Wireless Communications and Networking Conference Workshops (WCNCW), 2015 IEEE. 2015. IEEE.
[4]
Spachos, P., D. Toumpakaris, and D. Hatzinakos. Angle-based dynamic routing scheme for source location privacy in wireless sensor networks. in Vehicular Technology Conference (VTC Spring), 2014 IEEE 79th. 2014. IEEE.
[5]
Conti, M., J. Willemsen, and B. Crispo, Providing Source Location Privacy in Wireless Sensor Networks: A Survey. Communications Surveys & Tutorials, IEEE, 2013. 15(3): p. 1238--1280.
[6]
Mehta, K., D. Liu, and M. Wright, Protecting Location Privacy in Sensor Networks against a Global Eavesdropper. IEEE Transactions on Mobile Computing, 2012. 11(2): p. 320--336.
[7]
Gagneja, K.K. Secure communication scheme for wireless sensor networks to maintain anonymity. in Computing, Networking and Communications (ICNC), 2015 International Conference on. 2015. IEEE.
[8]
Shao, M., et al. Towards Statistically Strong Source Anonymity for Sensor Networks. in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications. 2008.
[9]
Bradbury, M., M. Leeke, and A. Jhumka. A dynamic fake source algorithm for source location privacy in wireless sensor networks. in Trustcom/BigDataSE/ISPA, 2015 IEEE. 2015. IEEE.
[10]
Chaudhari, M. and S. Dharawath. Toward a statistical framework for source anonymity in sensor network using quantitative measures. in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. 2015.
[11]
Alomair, B., et al., Toward a Statistical Framework for Source Anonymity in Sensor Networks. Mobile Computing, IEEE Transactions on, 2013. 12(2): p. 248--260.
[12]
Yang, Y., et al., Towards event source unobservability with minimum network traffic in sensor networks, in Proceedings of the first ACM conference on Wireless network security. 2008, ACM: Alexandria, VA, USA. p. 77--88.
[13]
Donnelly, R. and W.M. Kelley, The humongous book of Statistics Problems. 2009: Penguin.
[14]
Bushang, A., A. Abuzneid, and A. Mahmood. Source anonymity in WSNs against global adversary based on low rate fake injections. in Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES), 2016 IEEE/ACES International Conference on. 2016. IEEE.
[15]
Bushnag, A., A. Abuzneid, and A. Mahmood, Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints. Sensors, 2016. 16(7): p. 957.
[16]
Katzenbeisser, S. and F. Petitcolas, Information hiding techniques for steganography and digital watermarking. 2000: Artech house.
[17]
Huang, J., et al. A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. in Proceedings of the 30th Annual ACM Symposium on Applied Computing. 2015. ACM.
[18]
Niu, X., et al., An energy-efficient source-anonymity protocol in surveillance systems. Personal and Ubiquitous Computing, 2016. 20(5): p. 771--783.
[19]
Yang, Y., et al., Towards statistically strong source anonymity for sensor networks. ACM Transactions on Sensor Networks (TOSN), 2013. 9(3): p. 34.

Cited By

View all
  • (2023)A Scheme for Source Location Privacy of Multiple Sources in Wireless Sensor NetworksAdvances on Broad-Band and Wireless Computing, Communication and Applications10.1007/978-3-031-46784-4_12(135-148)Online publication date: 31-Oct-2023
  • (2019)Self-Healing Anonymous Routing in Unstable Sensor Networks2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud.2019.00020(88-95)Online publication date: Aug-2019
  • (2018)Source Anonymity against Global Adversary in WSNs Using Dummy Packet Injections: A SurveyElectronics10.3390/electronics71002507:10(250)Online publication date: 13-Oct-2018

Index Terms

  1. An Efficient Source Anonymity Technique based on Exponential Distribution against a Global Adversary Model using Fake Injections

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      Q2SWinet '17: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks
      November 2017
      130 pages
      ISBN:9781450351652
      DOI:10.1145/3132114
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 November 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. context privacy
      2. source location privacy
      3. wsns privacy

      Qualifiers

      • Research-article

      Conference

      MSWiM '17
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 46 of 131 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Scheme for Source Location Privacy of Multiple Sources in Wireless Sensor NetworksAdvances on Broad-Band and Wireless Computing, Communication and Applications10.1007/978-3-031-46784-4_12(135-148)Online publication date: 31-Oct-2023
      • (2019)Self-Healing Anonymous Routing in Unstable Sensor Networks2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud.2019.00020(88-95)Online publication date: Aug-2019
      • (2018)Source Anonymity against Global Adversary in WSNs Using Dummy Packet Injections: A SurveyElectronics10.3390/electronics71002507:10(250)Online publication date: 13-Oct-2018

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media