Abstract
Many efforts have been made to protect sensor networks against attacks, and standard mechanisms such as encryption are widely used to provide security services. However, the wireless transmission of a message itself may reveal to the adversary the origin of a sensed event, i.e., the source location of the message. Providing such position privacy in sensor networks is a challenging task. Traditional anonymity techniques are inappropriate for resource-constrained sensor networks, but an adversary may easily monitor the network communications. In this work, we focus on protecting source location privacy in the global attack model, where an adversary may have a global view of the communications in a sensor network and employ traffic analysis to locate the message sources. A flexible and effective countermeasure based on secure data aggregation is proposed to prevent the leakage of source location information. Both theoretical analysis and simulations are presented to validate the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88–93 (2004)
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad. Hoc. Netw. 7(8), 1501–1514 (2009)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proc. 25th IEEE International Conference on Distributed Computing Systems, pp. 599–608 (2005)
Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proc. 20th International Parallel and Distributed Processing Symposium, pp. 425–432 (2006)
Ouyang, Y., Le, X., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proc. International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 10–34 (2006)
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proc. 1st ACM Conference on Wireless Network Security, pp. 77–88 (2008)
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proc. IEEE International Conference on Network Protocols, pp. 314–323 (2007)
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proc. 27th IEEE International Conference on Computer Communications, pp. 466–474 (2008)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proc. 33rd Hawaii International Conference on System Sciences, pp. 3005–3014 (2000)
Younis, O., Fahmy, S.: HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. on Mob. Comput. 3(4), 366–379 (2004)
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.T.: PDA: Privacy-preserving data aggregation in wireless sensor networks. In: Proc. 26th IEEE International Conference on Computer Communications, pp. 2045–2053 (2007)
Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A tiny aggregation service for ad-hoc sensor networks. In: Proc. 5th Symposium on Operating Systems Design and Implementation, pp. 131–146 (2002)
Knuth, D.E.: 3.4. In: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2, pp. 132–133. Addison Wesley Longman, Amsterdam (1998)
Feng, T., Wang, C., Zhang, W., Ruan, L.: Confidentiality protection for distributed sensor data aggregation. In: Proc. 27th IEEE International Conference on Computer Communications, pp. 475–483 (2008)
Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. on Sens. Netw. 5(3), 1–36 (2009)
Wolff, R.W.: Possion arrivals see time averages. Operations Research 30(2), 223–231 (1982)
Mood, A.M., Graybill, F.A., Boes, D.C.: 5.3.2. In: Introduction to The Theory of Statistics, pp. 182–185. McGraw-Hill, New York (1974)
Kleinrock, L.: Queueing Systems. Theory, vol. 1. John Wiley and Sons, Inc., Chichester (1975)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, W., Zhu, W.T. (2010). Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation. In: Yu, Z., Liscano, R., Chen, G., Zhang, D., Zhou, X. (eds) Ubiquitous Intelligence and Computing. UIC 2010. Lecture Notes in Computer Science, vol 6406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16355-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-16355-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16354-8
Online ISBN: 978-3-642-16355-5
eBook Packages: Computer ScienceComputer Science (R0)