ABSTRACT
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is confidentiality of the source sensor's location. In this paper, we focus on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication. In particular, we focus on the class of flooding protocols. While developing and evaluating our privacy-aware routing protocols, we jointly consider issues of location-privacy as well as the amount of energy consumed by the sensor network. Motivated by the observations, we propose a flexible routing strategy, known as <i>phantom routing</i>, which protects the source's location. Phantom routing is a two-stage routing scheme that first consists of a directed walk along a random direction, followed by routing from the phantom source to the sink. Our investigations have shown that phantom routing is a powerful technique for protecting the location of the source during sensor transmissions.
- Wireless securty workshop. See http://www.ece.cmu.edu/ adrian/wise2004/.Google Scholar
- P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proceedings of IEEE INFOCOM'00, 2000.Google ScholarCross Ref
- C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smit. Parametric probabilistic sensor network routing. In Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, 2003. Google ScholarDigital Library
- D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, 2002. Google ScholarDigital Library
- D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84--88, 1981. Google ScholarDigital Library
- Z. Cheng and W. Heinzelman. Flooding Strategy for Target Discovery in Wireless Networks. In proceedings of the Sixth ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2003), 2003. Google ScholarDigital Library
- P. Th. Eugster, R. Guerraoui, S. B. Handurukande, P. Kouznetsov, and A.-M. Kermarrec. Lightweight probabilistic broadcast. ACM Transactions on Computer Systems (TOCS), 21(4):341--374, November 2003. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking. In Proceedings of the nternational Conference on Mobile Systems, Applications, and Services (MobiSys), 2003. Google ScholarDigital Library
- M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In Workshop on Hot Topics in Operating Systems (HotOS), 2003. Google ScholarDigital Library
- C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), August 2000. Google ScholarDigital Library
- H. Lim and C. Kim. Flooding in Wireless Ad-hoc Networks. In IEEE computer communications, 2000. Google ScholarDigital Library
- Mixmaster remailer. http://mixmaster.sourceforge.net/.Google Scholar
- M.Reed, P. Syverson, and D. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16:482--494, May 1998. Google ScholarDigital Library
- D. Niculescu and B. Nath. Ad Hoc Positioning System (APS). In Proceedings of the IEEE GLOBECOM 2001, November 2001.Google ScholarCross Ref
- D. Niculescu and B. Nath. Trajectory Based Forwarding and its Applications. In Proceedings of the Ninth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), pages 260--272, September 2003. Google ScholarDigital Library
- A. Savvides, C. Han, and M. B. Strivastava. Dynamic fine-grained localization in Ad-Hoc networks of sensors. In International Conference on Mobile Computing and Networks (MobiCOM), pages 166--179, 2001. Google ScholarDigital Library
- P. Syverson, M. Reed, and D. Goldschlag. Onion routing access configurations. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, pages 34--40, January 2000.Google ScholarCross Ref
Index Terms
- Source-location privacy in energy-constrained sensor network routing
Recommendations
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10: Proceedings of the 29th conference on Information communicationsWireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. ...
A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computingSource-location privacy is a sensor network privacy that is quite different from content privacy, which could be protected by usual network security techniques. In a sensor network environment, the wireless medium is shared. An adversaries may trace ...
Improving source-location privacy through opportunistic routing in wireless sensor networks
ISCC '11: Proceedings of the 2011 IEEE Symposium on Computers and CommunicationsWireless sensor networks (WSN) can be an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks ...
Comments