8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

Sensor Source Location Privacy based on Random Perturbations

Download29 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2012.250621,
        author={Uthaiwan Srimongkolpitak and Yi Yang},
        title={Sensor Source Location Privacy based on Random Perturbations},
        proceedings={8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={12},
        keywords={source location privacy wireless sensor networks random perturbations uniform distribution gaussian distribution},
        doi={10.4108/icst.collaboratecom.2012.250621}
    }
    
  • Uthaiwan Srimongkolpitak
    Yi Yang
    Year: 2012
    Sensor Source Location Privacy based on Random Perturbations
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2012.250621
Uthaiwan Srimongkolpitak1, Yi Yang1,*
  • 1: The Catholic University of America
*Contact email: yangy@cua.edu

Abstract

Sensor source location privacy, which means to protect source sensors’ locations of network traffic, is an emerging topic in wireless sensor networks, because it cannot be fully addressed by traditional cryptographic mechanisms, such as encryption and authentication. Current source location privacy schemes, assuming either a local attack model or a global attack model, have limitations. For example, schemes under a global attack model are subject to a so called ‘01’ attack. Targeting on solving this attack under a global attack model, we propose two perturbation schemes, one based on Uniform Distribution and the other based on Gaussian distribution. We analyze the security properties of these two schemes. We also simulate them and compare them with previous schemes, with the results showing that the proposed perturbation schemes can improve the source location privacy significantly.