Issue No. 02 - Feb. (2013 vol. 12)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2011.267
B. Alomair , Comput. Res. Inst. (CRI), King Abdulaziz City for Sci. & Technol. (KACST), Riyadh, Saudi Arabia
A. Clark , Dept. of Electr. Eng., Univ. of Washington, Seattle, WA, USA
J. Cuellar , Corp. Res. & Technol., CERT, Munich, Germany
R. Poovendran , Dept. of Electr. Eng., Univ. of Washington, Seattle, WA, USA
In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.
wireless sensor networks, binary codes, security of data, statistical testing, telecommunication security, telecommunication traffic, WSN security, unauthorized observer, network traffic, source anonymity problem, wireless sensor network, anonymity evaluation, interval indistinguishability, statistical problem, binary hypothesis testing, nuisance parameter, anonymous sensor network, mapping source anonymity, data transformation, binary code, coding theory, Games, Random variables, Wireless sensor networks, Monitoring, Testing, Delay, Cryptography, coding theory, Wireless sensor networks (WSN), source location, privacy, anonymity, hypothesis testing, nuisance parameters
B. Alomair, A. Clark, J. Cuellar and R. Poovendran, "Toward a Statistical Framework for Source Anonymity in Sensor Networks," in IEEE Transactions on Mobile Computing, vol. 12, no. , pp. 248-260, 2013.