4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

Source Location Privacy against Laptop-Class Attacks in Sensor Networks

  • @INPROCEEDINGS{10.1145/1460877.1460884,
        author={Yi Ouyang and Zhengyi  Le and James Ford and Donggang  Liu and Fillia Makedon},
        title={Source Location Privacy against Laptop-Class Attacks in Sensor Networks},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Source location privacy Sensor networks.},
        doi={10.1145/1460877.1460884}
    }
    
  • Yi Ouyang
    Zhengyi Le
    James Ford
    Donggang Liu
    Fillia Makedon
    Year: 2008
    Source Location Privacy against Laptop-Class Attacks in Sensor Networks
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460884
Yi Ouyang1,*, Zhengyi Le1,*, James Ford1, Donggang Liu1,*, Fillia Makedon1,*
  • 1: Computer Science and Engineering Department University of Texas at Arlington Arlington, TX
*Contact email: yi.ouyang.a@gmail.com, zyle@uta.edu, dliu@uta.edu, makedon@uta.edu

Abstract

Sensor networks may be used in many monitoring applica- tions where the locations of the monitored objects are quite sensitive and need to be protected. Previous research mainly focuses on protecting source location against mote-class at- tackers who only have a local view of the network traffic. In this paper, we focus on how to protect the source loca- tion against laptop-class attackers who have a global view of the network traffic. This paper proposes four schemes— naive, global, greedy, and probabilistic—to deal with laptop- class attacks. The naive solution uses maintenance mes- sages sent periodically to hide real event reports. The global and greedy solutions improve the naive solution by reducing the latency of event delivery without increasing communica- tion overhead. The probabilistic solution further improves the performance by reducing communication overhead with- out sacrificing location privacy. Experiments show that the probabilistic solution is practical for providing source loca- tion privacy against a laptop-class attacker.