Research Article
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
467 downloads
@INPROCEEDINGS{10.1007/978-3-642-05284-2_22, author={Yi Yang and Sencun Zhu and Guohong Cao and Thomas LaPorta}, title={An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures}, proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={Active Global Attacker Source Location Privacy Wireless Sensor Network L-diversity K-anonymity}, doi={10.1007/978-3-642-05284-2_22} }
- Yi Yang
Sencun Zhu
Guohong Cao
Thomas LaPorta
Year: 2012
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
SECURECOMM
Springer
DOI: 10.1007/978-3-642-05284-2_22
Abstract
Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it.
Copyright © 2009–2024 ICST