Research Article
Set Difference Attacks in Wireless Sensor Networks
445 downloads
@INPROCEEDINGS{10.1007/978-3-642-36883-7_7, author={Tulio Souza and Joss Wright and Piers O’Hanlon and Ian Brown}, title={Set Difference Attacks in Wireless Sensor Networks}, proceedings={Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2013}, month={2}, keywords={privacy privacy-preserving wireless sensor network data perturbation differential privacy privacy-preserving data aggregation}, doi={10.1007/978-3-642-36883-7_7} }
- Tulio Souza
Joss Wright
Piers O’Hanlon
Ian Brown
Year: 2013
Set Difference Attacks in Wireless Sensor Networks
SECURECOMM
Springer
DOI: 10.1007/978-3-642-36883-7_7
Abstract
We show that existing proposed mechanisms for preserving the privacy of reported data values in wireless sensor networks are vulnerable against a simple and practical form of attack: the . These attacks are particularly effective where a number of separate applications are running in a given network, but are not limited to this case. We demonstrate the feasibility of these attacks and assert that they cannot, in general, be avoided whilst maintaining absolute accuracy of sensed data. As an implication of this, we suggest a mechanism based on perturbation of sensor results whereby these attacks can be partially mitigated.
Copyright © 2012–2024 ICST