skip to main content
10.1145/1029102.1029117acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Source-location privacy in energy-constrained sensor network routing

Published:25 October 2004Publication History

ABSTRACT

As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is confidentiality of the source sensor's location. In this paper, we focus on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication. In particular, we focus on the class of flooding protocols. While developing and evaluating our privacy-aware routing protocols, we jointly consider issues of location-privacy as well as the amount of energy consumed by the sensor network. Motivated by the observations, we propose a flexible routing strategy, known as <i>phantom routing</i>, which protects the source's location. Phantom routing is a two-stage routing scheme that first consists of a directed walk along a random direction, followed by routing from the phantom source to the sink. Our investigations have shown that phantom routing is a powerful technique for protecting the location of the source during sensor transmissions.

References

  1. Wireless securty workshop. See http://www.ece.cmu.edu/ adrian/wise2004/.Google ScholarGoogle Scholar
  2. P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proceedings of IEEE INFOCOM'00, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smit. Parametric probabilistic sensor network routing. In Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84--88, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Z. Cheng and W. Heinzelman. Flooding Strategy for Target Discovery in Wireless Networks. In proceedings of the Sixth ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2003), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Th. Eugster, R. Guerraoui, S. B. Handurukande, P. Kouznetsov, and A.-M. Kermarrec. Lightweight probabilistic broadcast. ACM Transactions on Computer Systems (TOCS), 21(4):341--374, November 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Gruteser and D. Grunwald. Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking. In Proceedings of the nternational Conference on Mobile Systems, Applications, and Services (MobiSys), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In Workshop on Hot Topics in Operating Systems (HotOS), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Lim and C. Kim. Flooding in Wireless Ad-hoc Networks. In IEEE computer communications, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mixmaster remailer. http://mixmaster.sourceforge.net/.Google ScholarGoogle Scholar
  13. M.Reed, P. Syverson, and D. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16:482--494, May 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Niculescu and B. Nath. Ad Hoc Positioning System (APS). In Proceedings of the IEEE GLOBECOM 2001, November 2001.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Niculescu and B. Nath. Trajectory Based Forwarding and its Applications. In Proceedings of the Ninth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), pages 260--272, September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Savvides, C. Han, and M. B. Strivastava. Dynamic fine-grained localization in Ad-Hoc networks of sensors. In International Conference on Mobile Computing and Networks (MobiCOM), pages 166--179, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Syverson, M. Reed, and D. Goldschlag. Onion routing access configurations. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, pages 34--40, January 2000.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Source-location privacy in energy-constrained sensor network routing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
      October 2004
      124 pages
      ISBN:1581139721
      DOI:10.1145/1029102

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader