The Community for Technology Leaders
RSS Icon
Issue No.10 - Oct. (2012 vol.23)
pp: 1805-1818
Mohamed M.E.A. Mahmoud , University of Waterloo, Waterloo
Xuemin Shen , University of Waterloo, Waterloo
In wireless sensor networks, adversaries can make use of the traffic information to locate the monitored objects, e.g., to hunt endangered animals or kill soldiers. In this paper, we first define a hotspot phenomenon that causes an obvious inconsistency in the network traffic pattern due to the large volume of packets originating from a small area. Second, we develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple areas, rather than the entire network or only one area. Using this model, we introduce a novel attack called Hotspot-Locating where the adversary uses traffic analysis techniques to locate hotspots. Finally, we propose a cloud-based scheme for efficiently protecting source nodes' location privacy against Hotspot-Locating attack by creating a cloud with an irregular shape of fake traffic, to counteract the inconsistency in the traffic pattern and camouflage the source node in the nodes forming the cloud. To reduce the energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than global-adversary-based schemes.
Privacy, Monitoring, Wireless sensor networks, Cryptography, Correlation, Wireless communication, Data privacy, and anonymity, Wireless sensor network privacy, source-location privacy-preserving schemes, context privacy
Mohamed M.E.A. Mahmoud, Xuemin Shen, "A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 10, pp. 1805-1818, Oct. 2012, doi:10.1109/TPDS.2011.302
[1] K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols and Applications. John Wiley & Sons, Inc., 2007.
[2] I. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[3] A. Arora et al., "A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking," Computer Networks, vol. 46, pp. 605-634, 2004.
[4] "WWWF-the Conservation Organization," http:/www.panda. org/, 2012.
[5] Star News, Panda Poaching Gang Arrested, Shanghai Star Telegram, Apr. 2003.
[6] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source Location Privacy in Sensor Network Routing," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '05), pp. 599-608, June 2005.
[7] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "Spins: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[8] M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," Proc. IEEE INFOCOM '08, pp. 51-59, Apr. 2008.
[9] Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks," Proc. First ACM Conf. Wireless Network Security (WiSec '08), pp. 77-88, Apr. 2008.
[10] B. Hoh and M. Gruteser, "Protecting Location Privacy through Path Confusion," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), pp. 194-205, Sept. 2005.
[11] M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Selected Areas of Comm., vol. 16, no. 4, pp 482-494, May 1998.
[12] M. Mahmoud and X. Shen, "Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Networks," Proc. IEEE INFOCOM '11-Int'l Workshop Security in Computers, Networking, and Comm. (SCNC), pp. 1006-1011, Apr. 2011.
[13] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
[14] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Mask: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
[15] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A Novel Scheme for Protecting Receiver's Location Privacy in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 7, no. 10, pp. 3769-3779, Oct. 2008.
[16] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting Receiver-Location Privacy in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1955-1963, May 2007.
[17] J. Deng, R. Han, and S. Mishra, "Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm), pp. 113-126, Sept. 2005.
[18] C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy Constrained Sensor Network Routing," Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 88-93, 2004.
[19] H. Wang, B. Sheng, and Q. Li, "Privacy-Aware Routing in Sensor Networks," Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009.
[20] K. Pongaliur and L. Xiao, "Maintaining Source Privacy Under Eavesdropping and Node Compromise Attacks," Proc. IEEE INFOCOM, Apr. 2011.
[21] Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding," Proc. IEEE INFOCOM '09, Apr. 2009.
[22] R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm., May 2010.
[23] K. Mehta, D. Liu, and M. Wright, "Protecting Location Privacy in Sensor Networks against a Global Eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, pp. 320-336, Feb. 2011.
[24] B. Alomair, A. Clark, and J. Cuellar, "Statistical Framework for Source Anonymity in Sensor Networks," Proc. IEEE GLOBECOM, Dec. 2010.
[25] K. Bicakci, H. Gultekin, B. Tavli, and I.E. Bagci, "Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks," Computer Standards and Interfaces, vol. 33, no. 4, pp. 401-410, June 2011.
[26] X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective Probabilistic Approach Protecting Sensor Traffic," Proc. IEEE Military Comm. Conf. (MILCOM), vol. 1, pp. 169-175, Oct. 2005.
[27] S. Tilak, N. Abu-Ghazaleh, and W. Heinzelman, "A Taxonomy of Wireless Micro-Sensor Network Models," ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 6, no. 2, pp. 28-36, Apr. 2002.
[28] W. Trappe and L.C. Washington, Introduction to Cryptography with Coding Theory. Prentice Hall, 2002.
[29] D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), vol. 2139, pp. 213-229, 2001.
[30] Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure Localization and Authentication in Ultra-Wideband Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 4, pp. 829-835, Apr. 2006.
[31] X. Cheng, A. Thaeler, G. Xue, and D. Chen, "TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks," Proc. IEEE INFOCOM, vol. 4, pp. 2685-2696, Mar. 2004.
[32] A. Pfitzmann and M. Kohntopp, "Anonymity, Unobservability and Pseudonymity—A Proposal for Terminology," Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 1-9, 2001.
[33] S. Jiang, N. Vaidya, and W. Zhao, "Prevent Traffic Analysis in Packet Radio Networks," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX II '01), pp. 1153-1158, June 2001.
[34] C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity," Proc. Second Int'l Conf. Privacy Enhancing Technologies, pp. 54-68, 2002.
[35] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Mar.\Apr. 2006.
[36] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
[37] G. de Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, "On The Energy Cost of Communication and Cryptography in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, pp. 580-585, 2008.
[38] Y. Li and J. Ren, "Preserving Source-Location Privacy in Wireless Sensor Networks," Proc. IEEE Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 493-501, June 2009.
[39] G.J. Pottie and W.J. Kaiser, "Wireless Integrated Network Sensors," Comm. ACM, vol. 43, no. 5, pp. 51-58, 2000.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool