
Research Article
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
559 downloads
- @INPROCEEDINGS{10.1007/978-3-642-05284-2_22, author={Yi Yang and Sencun Zhu and Guohong Cao and Thomas LaPorta}, title={An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures}, proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={Active Global Attacker Source Location Privacy Wireless Sensor Network L-diversity K-anonymity}, doi={10.1007/978-3-642-05284-2_22} }
- Yi Yang
 Sencun Zhu
 Guohong Cao
 Thomas LaPorta
 Year: 2012
 An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
 SECURECOMM
 Springer
 DOI: 10.1007/978-3-642-05284-2_22
Abstract
Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it.
Copyright © 2009–2025 ICST


