全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Sensors  2010 

Achieving Network Level Privacy in Wireless Sensor Networks

DOI: 10.3390/s100301447

Keywords: anonymity, eavesdropping, hop-by-hop trace back, privacy, routing, wireless sensor networks

Full-Text   Cite this paper   Add to My Lib

Abstract:

Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

References

[1]  Xi, Y.; Schwiebert, L.; Shi, W. Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. Proceedings of Parallel and Distributed Processing Symposium (IPDPS 2006), Rhodes Island, Greece; 2006.
[2]  Habitat monitoring on Great Duck Island (Maine, USA). 2002. Available online: http://ucberkeley.citris-uc.org/research/projects/great_duck_island (accessed on 21 August, 2009).
[3]  Ozturk, C.; Zhang, Y.; Trappe, W. Source-Location Privacy in Energy-Constrained Sensor Network Routing. Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, Washington, DC, WA, USA; 2004; pp. 88–93.
[4]  Kamat, P.; Zhang, Y.; Trappe, W.; Ozturk, C. Enhancing Source-Location Privacy in Sensor Network Routing. Proceedings of the 25th IEEE International conference on Distributed Computing Systems, Columbus, OH, USA; 2005; pp. 599–608.
[5]  Misra, S.; Xue, G. Efficient Anonymity Schemes for Clustered Wireless Sensor Networks. Int. J. Sens. Netw?2006, 1, 50–63.
[6]  Wood, A.D.; Fang, L.; Stankovic, J.A.; He, T. SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks. Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA; 2006; pp. 35–48.
[7]  Ouyang, Y.; Le, Z.; Chen, G.; Ford, J.; Makedon, F. Entrapping Adversaries for Source Protection in Sensor Networks. Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06), Niagara-Falls, Buffalo, NY, USA; 2006; pp. 23–34.
[8]  Zorzi, M.; Rao, R.R. Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance. IEEE Tran. Mob. Comput?2003, 2, 337–348.
[9]  Zorzi, M.; Rao, R.R. Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Energy and Latency Performance. IEEE Tran. Mob. Comput?2003, 2, 349–365.
[10]  Capone, A.; Pizziniaco, L.; Filippini, I.; de la Fuente, M.G. SiFT: An Efficient Method for Trajectory Based Forwarding. Proceedings of International Symposium on Wireless Communication Systems, Siena, Italy; 2005; pp. 135–139.
[11]  Blum, B.; He, T.; Son, S.; Stankovic, J. IGF: A State-Free Robust Communication Protocol for Wireless Sensor Networks. Technical Report CS-2003-11; Department of Computer Science, University of Virginia, USA; 2003.
[12]  RYU, J.; Kim, S.G.; Choi, H.H.; An, S.S.; Ahn, S.Y.; Kim, B.J. Method and System for Locating Sensor Node in Sensor Network Using Transmit Power ControlU.S. Patent Application: 2009/0128298 A1. 2009.
[13]  Barbeau, M.; Kranakis, E.; Krizanc, D.; Morin, P. Improving Distance Based Geographic Location Techniques in Sensor Networks. Proceedings of 3rd International Conference on Ad Hoc Networks and Wireless, Vancouver, British Columbia; 2004; pp. 197–210.
[14]  Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS: Security Protocols for Sensor Networks. Wirel. Netw?2002, 8, 521–534.
[15]  Karlof, C.; Sastry, N.; Wagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA; 2004; pp. 162–175.
[16]  Lopez, J. Unleashing Public-Key Cryptography inWireless Sensor Networks. J. Comput. Security?2006, 14, 469–482.
[17]  Gaubatz, G.; Kaps, J.-P.; Sunar, B. Public Key Cryptography in Sensor Networks-Revisited. Lect. Note. Comput. Sci?2006, 3313, 2–18.
[18]  Armenia, S.; Morabito, G.; Palazzo, S. Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks. IFIP-Networking 2007, LNCS 4479, Atlanta, GA, USA, 2007, 215–226.
[19]  Shaikh, R.A.; Jameel, H.; d’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.-J. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. Sensors?2009, 9, 5989–6007.
[20]  Shaikh, R.A.; Jameel, H.; Lee, S.; Song, Y.J.; Rajput, S. Trust Management Problem in Distributed Wireless Sensor Networks. Proceedings of 12th IEEE International Conference on Embedded Real Time Computing Systems and its Applications (RTCSA 2006); IEEE Computer Society: Sydney, Australia, 2006; pp. 411–415.
[21]  Jiang, P. A New Method for Node Fault Detection in Wireless Sensor Networks. Sensors?2009, 9, 1282–1294.
[22]  Shaikh, R.A.; Jameel, H.; J. d’Auriol, B.; Lee, H.; Lee, S.; Song, Y.-J. Group-based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Trans. Parallel Dist. Sys?2009, 20, 1698–1712.
[23]  Buchegger, S.; Boudec, J.-Y.L. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. Proceedings of P2PEcon, Cambridge, MA, USA; 2004.
[24]  Gupta, S. Automatic Detection of DOS Routing Attacks in Wireless Sensor Networks. Master thesis, University of Houston, Houston, TX, USA, 2006.
[25]  Du, X.; Guizani, M.; Xiao, Y.; Chen, H.H. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks. IEEE Trans. Wirel. Commun?2007, 6, 3395–3401.
[26]  Karlof, C.; Wagner, D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications (WSNA03); IEEE Computer Society: Anchorage, Alaska, USA, 2003; pp. 113–127.
[27]  Srinivasan, A.; Teitelbaum, J.; Liang, H.; Wu, J.; Cardei, M. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks. In Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks; Boukerche, A., Ed.; Wiley & Sons: New Jersey, NJ, USA, 2006.
[28]  Durresi, A.; Paruchuri, V.; Durresi, M.; Barolli, L. Anonymous routing for mobile wireless ad hoc networks. Int. J. Distrib. Sens. Netw?2007, 3, 105–117.
[29]  Pfleeger, C.P.; Pfleeger, S.L. Security in Computing, 4th ed. ed.; Prentice Hall: New Jersey, NJ, USA, 2006.
[30]  Latif, R.; Hussain, M. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). Lect. Not. Comput. Sci?2009, 5576, 732–740.
[31]  Seetharam, D.; Rhee, S. An Efficient Pseudo Random Number Generator for Low-Power Sensor Networks. Proceedings of Annual IEEE International Conference on Local Computer Networks (LCN’04), Tampa, FL, USA; 2004.
[32]  Tilak, S.; Abu-Ghazaleh, N.B.; Heinzelman, W. A Taxonomy of Wireless Micro-Sensor Network Models. SIGMOBILE Mob. Comput. Commun. Rev?2002, 6, 28–36.
[33]  Shaikh, R.A.; Lee, S.; Khan, M.A.U.; Song, Y.J. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. Lect. Not. Comput. Sci?2007, 4217, 367–377.
[34]  Jamieson, K.; Balakrishnan, H.; Tay, Y.C. Sift: A MAC Protocol for Event-DrivenWireless Sensor Networks. Lect. Not. Comput. Sci?2006, 3868, 260–275.
[35]  Lee, S.H.; Cho, B.-H.; Choi, L.; Kim, S.-J. Event-Driven Power Management for Wireless Sensor Networks. Lect. Not. Comput. Sci?2007, 4761, 419–428.
[36]  Figueiredo, C.M.S.; Nakamura, E.F.; Loureiro, A.A.F. A Hybrid Adaptive Routing Algorithm for Event-Driven Wireless Sensor Networks. Sensors?2009, 9, 7287–7307.
[37]  Al-Karaki, J.N.; Kamal, A.E. Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wirel. Commun?2004, 11, 6–28.
[38]  Chenyang, Lu; Blum, B.M.; Abdelzaher, T.F.; Stankovic, J.A.; He, T. RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks. Proceedings of 8th IEEE Real-Time and Embedded Technology and Applications Symposium, San Jose, CA, USA; 2002; pp. 55–66.
[39]  Amin, S.O.; Siddiqui, M.S.; Hong, C.S.; Lee, S. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks. Sensors?2009, 9, 3447–3468.
[40]  Bloom, B.H. Space/Time Trade-Offs in Hash Coding with Allowable Errors. Commun. ACM?1970, 13, 422–426.
[41]  Szymanski, B.K. SENSE: Sensor Network Simulator and Emulator, Available Online: http://www.ita.cs.rpi.edu/sense/index.html (accessed on 25 April, 2009).
[42]  Crossbow Inc. Wireless Sensor Networks, MICA2 Series. Available Online: http://www.xbow.com (accessed on 21 June, 2008).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133