Research Article
Sensor Source Location Privacy based on Random Perturbations
@INPROCEEDINGS{10.4108/icst.collaboratecom.2012.250621, author={Uthaiwan Srimongkolpitak and Yi Yang}, title={Sensor Source Location Privacy based on Random Perturbations}, proceedings={8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing}, publisher={IEEE}, proceedings_a={COLLABORATECOM}, year={2012}, month={12}, keywords={source location privacy wireless sensor networks random perturbations uniform distribution gaussian distribution}, doi={10.4108/icst.collaboratecom.2012.250621} }
- Uthaiwan Srimongkolpitak
Yi Yang
Year: 2012
Sensor Source Location Privacy based on Random Perturbations
COLLABORATECOM
ICST
DOI: 10.4108/icst.collaboratecom.2012.250621
Abstract
Sensor source location privacy, which means to protect source sensors’ locations of network traffic, is an emerging topic in wireless sensor networks, because it cannot be fully addressed by traditional cryptographic mechanisms, such as encryption and authentication. Current source location privacy schemes, assuming either a local attack model or a global attack model, have limitations. For example, schemes under a global attack model are subject to a so called ‘01’ attack. Targeting on solving this attack under a global attack model, we propose two perturbation schemes, one based on Uniform Distribution and the other based on Gaussian distribution. We analyze the security properties of these two schemes. We also simulate them and compare them with previous schemes, with the results showing that the proposed perturbation schemes can improve the source location privacy significantly.