Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers

Research Article

Set Difference Attacks in Wireless Sensor Networks

Download
418 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-36883-7_7,
        author={Tulio Souza and Joss Wright and Piers O’Hanlon and Ian Brown},
        title={Set Difference Attacks in Wireless Sensor Networks},
        proceedings={Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2013},
        month={2},
        keywords={privacy privacy-preserving wireless sensor network data perturbation differential privacy privacy-preserving data aggregation},
        doi={10.1007/978-3-642-36883-7_7}
    }
    
  • Tulio Souza
    Joss Wright
    Piers O’Hanlon
    Ian Brown
    Year: 2013
    Set Difference Attacks in Wireless Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-36883-7_7
Tulio Souza1,*, Joss Wright1,*, Piers O’Hanlon1,*, Ian Brown1,*
  • 1: University of Oxford
*Contact email: tulio.de.souza@cs.ox.ac.uk, joss.wright@oii.ox.ac.uk, piers.ohanlon@oii.ox.ac.uk, ian.brown@oii.ox.ac.uk

Abstract

We show that existing proposed mechanisms for preserving the privacy of reported data values in wireless sensor networks are vulnerable against a simple and practical form of attack: the . These attacks are particularly effective where a number of separate applications are running in a given network, but are not limited to this case. We demonstrate the feasibility of these attacks and assert that they cannot, in general, be avoided whilst maintaining absolute accuracy of sensed data. As an implication of this, we suggest a mechanism based on perturbation of sensor results whereby these attacks can be partially mitigated.