1st International IEEE Conference on Pervasive Services

Research Article

Providing Anonymity in Wireless Sensor Networks

  • @INPROCEEDINGS{10.1109/PERSER.2007.4283904,
        author={Yi Ouyang and Zhengyi Le and Yurong  Xu and Nikos Triandopoulos  and Sheng  Zhang and James  Ford and Fillia  Makedon},
        title={Providing Anonymity in Wireless Sensor Networks},
        proceedings={1st International IEEE Conference on Pervasive Services},
        publisher={IEEE},
        proceedings_a={ICPS},
        year={2007},
        month={8},
        keywords={Base stations  Capacitive sensors  Cryptography  Educational institutions  Monitoring  Protection  Routing protocols  Telecommunication traffic  Tracking  Wireless sensor networks},
        doi={10.1109/PERSER.2007.4283904}
    }
    
  • Yi Ouyang
    Zhengyi Le
    Yurong Xu
    Nikos Triandopoulos
    Sheng Zhang
    James Ford
    Fillia Makedon
    Year: 2007
    Providing Anonymity in Wireless Sensor Networks
    ICPS
    IEEE
    DOI: 10.1109/PERSER.2007.4283904
Yi Ouyang1,2,3,*, Zhengyi Le1,2,3,*, Yurong Xu1,2,3,*, Nikos Triandopoulos 1,2,*, Sheng Zhang1,2,3,*, James Ford1,2,3,*, Fillia Makedon1,2,3,*
  • 1: DEVLAB, Computer Science Department, Dartmouth College, Hanover, NH 03755
  • 2: Institute for Security Technology Studies, Dartmouth College, Hanover, NH 03755
  • 3: Computer Science and Engineering Department, University of Texas at Arlington, Arlington, TX 76019
*Contact email: ouyang@cs.dartmouth.edu, zyle@cs.dartmouth.edu, yurong@cs.dartmouth.edu, nikos@cs.dartmouth.edu, clap@cs.dartmouth.edu, jford@cs.dartmouth.edu, makedon@cs.dartmouth.edu

Abstract

ensor networks are often used to monitor sensitive information from the environment or track sensitive objects' movements. Anonymity has become an important problem in sensor networks, and has been widely researched in wireless ad hoc and wired networks. The limited capacity and resources of current sensor networks have brought new challenges to anonymity research. In this paper, two efficient methods are proposed based on using a one-way hash chain to dynamically change the identity of sensor nodes in order to provide anonymity, and their anonymity properties are analyzed and compared.