Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Research Article

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures

Download
427 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-05284-2_22,
        author={Yi Yang and Sencun Zhu and Guohong Cao and Thomas LaPorta},
        title={An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures},
        proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={Active Global Attacker Source Location Privacy Wireless Sensor Network L-diversity K-anonymity},
        doi={10.1007/978-3-642-05284-2_22}
    }
    
  • Yi Yang
    Sencun Zhu
    Guohong Cao
    Thomas LaPorta
    Year: 2012
    An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-05284-2_22
Yi Yang1,*, Sencun Zhu1,*, Guohong Cao1,*, Thomas LaPorta1,*
  • 1: Pennsylvania State University
*Contact email: yy5@cse.psu.edu, szhu@cse.psu.edu, gcao@cse.psu.edu, tlp@cse.psu.edu

Abstract

Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it.