The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Feb. (2013 vol.12)
pp: 248-260
B. Alomair , Comput. Res. Inst. (CRI), King Abdulaziz City for Sci. & Technol. (KACST), Riyadh, Saudi Arabia
A. Clark , Dept. of Electr. Eng., Univ. of Washington, Seattle, WA, USA
J. Cuellar , Corp. Res. & Technol., CERT, Munich, Germany
R. Poovendran , Dept. of Electr. Eng., Univ. of Washington, Seattle, WA, USA
ABSTRACT
In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.
INDEX TERMS
wireless sensor networks, binary codes, security of data, statistical testing, telecommunication security, telecommunication traffic, WSN security, unauthorized observer, network traffic, source anonymity problem, wireless sensor network, anonymity evaluation, interval indistinguishability, statistical problem, binary hypothesis testing, nuisance parameter, anonymous sensor network, mapping source anonymity, data transformation, binary code, coding theory, Games, Random variables, Wireless sensor networks, Monitoring, Testing, Delay, Cryptography, coding theory, Wireless sensor networks (WSN), source location, privacy, anonymity, hypothesis testing, nuisance parameters
CITATION
B. Alomair, A. Clark, J. Cuellar, R. Poovendran, "Toward a Statistical Framework for Source Anonymity in Sensor Networks", IEEE Transactions on Mobile Computing, vol.12, no. 2, pp. 248-260, Feb. 2013, doi:10.1109/TMC.2011.267
REFERENCES
[1] B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "On Source Anonymity in Wireless Sensor Networks," Proc. IEEE/IFIP 40th Int'l Conf. Dependable Systems and Networks (DSN '10), 2010.
[2] B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Statistical Framework for Source Anonymity in Sensor Networks," Proc. IEEE GlobeCom, 2010.
[3] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
[4] T. Arampatzis, J. Lygeros, and S. Manesis, "A Survey of Applications of Wireless Sensors and Wireless Sensor Networks," Proc. IEEE 13th Mediterranean Conf. Control and Automation (MED '05), pp. 719-724, 2006.
[5] J. Yick, B. Mukherjee, and D. Ghosal, "Wireless Sensor Network Survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
[6] L. Eschenauer and V. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 41-47, 2002.
[7] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[8] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "HIGHT: A New Block Cipher Suitable for Low-Resource Device," Proc. Eighth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 46-59, 2006.
[9] A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An Ultra-Lightweight Block Cipher," Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 450-466, 2007.
[10] K. Mehta, D. Liu, and M. Wright, "Location Privacy in Sensor Networks against a Global Eavesdropper," Proc. IEEE 15th Int'l Conf. Network Protocols (ICNP '07), pp. 314-323, 2007.
[11] M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," Proc. IEEE INFOCOM, pp. 466-474, 2008.
[12] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source-Location Privacy in Sensor Network Routing," Proc. IEEE 25th Int'l Conf. Distributed Computing Systems (ICDCS '05), pp. 599-608, 2005.
[13] C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy-Constrained Sensor Network Routing," Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 88-93, 2004.
[14] Y. Ouyang, Z. Le, G. Chen, J. Ford, F. Makedon, and U. Lowell, "Entrapping Adversaries for Source Protection in Sensor Networks," Proc. IEEE Seventh Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WOWMOM '06), pp. 32-41, 2006.
[15] X. Wang, X. Li, Z. Wan, and M. Gu, "CLEAR: A Confidential and Lifetime-Aware Routing Protocol for Wireless Sensor Network," Proc. IEEE 20th Ann. Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '09), pp. 2265-2269, 2009.
[16] Y. Li and J. Ren, "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1-9, 2010.
[17] Y. Xi, L. Schwiebert, and W. Shi, "Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks," Proc. IEEE 20th Int'l Parallel & Distributed Processing Symp. (IPDPS '06), pp. 1-8, 2006.
[18] B. Hoh and M. Gruteser, "Protecting Location Privacy Through Path Confusion," Proc. IEEE/CreatNet First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), pp. 194-205, 2005.
[19] Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks," Proc. First ACM Conf. Wireless Network Security (WiSec '08), pp. 77-88, 2008.
[20] N. Li, N. Zhang, S. Das, and B. Thuraisingham, "Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey," Elsevier J. Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.
[21] H. Wang, B. Sheng, and Q. Li, "Privacy-Aware Routing in Sensor Networks," Elsevier J. Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009.
[22] M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, and T. La Porta, "Cross-Layer Enhanced Source Location Privacy in Sensor Networks," Proc. IEEE Comm. Soc. Sixth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 324-332, 2009.
[23] B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, "Query Privacy in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 6, no. 2, pp. 1-34, 2010.
[24] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 28, no. 5, pp. 677-691, June 2010.
[25] S. Goldwasser and S. Micali, "Probabilistic Encryption," J. Computer and System Sciences, vol. 28, no. 2, pp. 270-299, 1984.
[26] T. Anderson and D. Darling, "Asymptotic Theory of Certain 'Goodness of Fit' Criteria Based on Stochastic Processes," The Annals of Math. Statistics, vol. 23, no. 2, pp. 193-212, 1952.
[27] F. MasseyJr., "The Kolmogorov-Smirnov Test for Goodness of Fit," J. Am. Statistical Assoc., vol. 46, no. 253, pp. 68-78, 1951.
[28] C. Jarque and A. Bera, "A Test for Normality of Observations and Regression Residuals," Int'l Statistical Rev./Revue Internationale de Statistique, vol. 55, no. 2, pp. 163-172, 1987.
[29] S. Golomb and G. Gong, Signal Design for Good Correlation. Cambridge Univ., 2005.
[30] L. Scharf, Statistical Signal Processing: Detection, Estimation, and Time Series Analysis. Addison-Wesley, 1991.
[31] H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks. Wiley, 2005.
[32] Q. Gu, X. Chen, Z. Jiang, and J. Wu, "Sink-Anonymity Mobility Control in Wireless Sensor Networks," Proc. IEEE Fifth Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '09), pp. 36-41, 2009.
[33] E. Shakshuki, T. Sheltami, N. Kang, and X. Xing, "Tracking Anonymous Sinks in Wireless Sensor Networks," Proc. IEEE 23rd Int'l Conf. Advanced Information Networking and Applications (AINA '09), pp. 510-516, 2009.
[34] E. Ngai and I. Rodhe, "On Providing Location Privacy for Mobile Sinks in Wireless Sensor Networks," Proc. 12th ACM Int'l Conf. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '09), pp. 116-123, 2009.
[35] E. Ngai, "On Providing Sink Anonymity for Sensor Networks," Proc. Fifth Int'l Conf. Wireless Comm. and Mobile Computing: Connecting the World Wirelessly (IWCMC '09), pp. 269-273, 2009.
[36] Z. Liu and W. Xu, "Zeroing-In on Network Metric Minima for Sink Location Determination," Proc. Third ACM Conf. Wireless Network Security (WiSec '10), pp. 99-104, 2010.
[37] E. Ayday, F. Delgosha, and F. Fekri, "Location-aware Security Services for Wireless Sensor Networks Using Network Coding," Proc. IEEE INFOCOM, pp. 1226-1234, 2007.
[38] Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding," Proc. IEEE INFOCOM, pp. 19-25, 2009.
[39] Y. Jiang, Y. Fan, X. Shen, and C. Lin, "A Self-Adaptive Probabilistic Packet Filtering Scheme against Entropy Attacks in Network Coding," Computer Networks, vol. 53, no. 18, pp. 3089-3101, 2009.
[40] D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-90, 1981.
[41] M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 482-494, May 1998.
[42] M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. ACM MobiSys, pp. 31-42, 2003.
[43] M. Stephens, "EDF Statistics for Goodness of Fit and Some Comparisons," J. Am. Statistical Assoc., vol. 69, no. 347, pp. 730-737, 1974.
[44] W. Yang and W. Zhu, "Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation," Proc. Seventh Int'l Conf. Ubiquitous Intelligence and Computing (UIC '10), pp. 252-266, 2010.
[45] M. Shao, S. Zhu, W. Zhang, G. Cao, and Y. Yang, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009.
[46] Y. Li and J. Ren, "Preserving Source-Location Privacy in Wireless Sensor Networks," Proc. IEEE Sixth Ann. Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 493-501, 2009.
[47] Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, "Source Location Privacy against Laptop-Class Attacks in Sensor Networks," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08), pp. 1-10, 2008.
[48] A. Abbasi, A. Khonsari, and M. Talebi, "Source Location Anonymity for Sensor Networks," Proc. IEEE Sixth Conf. Consumer Comm. and Networking Conf. (CCNC '09), pp. 588-592, 2009.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool