Enhancing Source-Location Privacy in Sensor Network Routing
read more
Citations
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
Securing wireless sensor networks: a survey
Security in wireless sensor networks
Preserving privacy in gps traces via uncertainty-aware path cloaking
Attack-resistant location estimation in sensor networks
References
GPSR: greedy perimeter stateless routing for wireless networks
Directed diffusion: a scalable and robust communication paradigm for sensor networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An energy-efficient MAC protocol for wireless sensor networks
Untraceable electronic mail, return addresses, and digital pseudonyms
Related Papers (5)
Frequently Asked Questions (14)
Q2. What have the authors contributed in "Enhancing source-location privacy in sensor network routing" ?
This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols. The authors examine two popular classes of routing protocols: the class of flooding protocols, and the class of routing protocols involving only a single path from the source to the sink. While investigating the privacy performance of routing protocols, the authors considered the tradeoffs between location-privacy and energy consumption. The authors found that most of the current protocols can not provide efficient source-location privacy while maintaining desirable system performance. One of their strategies, a technique the authors have called phantom routing, has proven flexible and capable of protecting the source ’ s location, while not incurring a noticeable increase in energy overhead. Further, the authors examined the effect of source mobility on location privacy. The authors showed that, even with the natural privacy amplification resulting from source mobility, their phantom routing techniques yield improved source-location privacy relative to other routing methods.
Q3. How do the authors avoid random walks cancelling each other?
In order to avoid random walks cancelling each other, the authors need to introduce bias into the walking process, and therefore the authors propose the use of a directed walk to provide locationprivacy.
Q4. How do the authors achieve better location privacy?
To achieve improved location privacy, the authors proposed a new family of routing techniques, called phantom routing, for both theflooding and single-path classes that enhance privacy protection.
Q5. What is the probability that a node forwards a message?
The probability that a node forwards a message is referred to as the forwarding probability (Pforward), and plain flooding can be viewed as probabilistic flooding with Pforward = 1.
Q6. How does Pforward improve the safety of a flood?
For instance, in their study, probabilistic flooding with Pforward = 0.7 can improve the safety period of baseline flooding roughly by a factor of 2.
Q7. What is the predominant energy usage for flooding-based techniques?
however, the predominant energy usage for flooding-based techniques comes from the flooding phase, and usually hwalk n.
Q8. What is the first proposed optimization of the baseline flooding technique?
4 Probabilistic flooding [16, 17] was first proposed as an optimization of the baseline flooding technique to cut down energy consumption.
Q9. What is the probability that a node receives a new message?
Every time a node receives a new message (it discards the message that it has received before no matter whether it has forwarded it or not), it generates a random number q that is uniformly distributed between 0 and 1.
Q10. What is the effect of a larger hearing range on the hunter?
In general, the authors find that a larger hearing range helps the hunter since this translates into the hunter hearing messages sooner and allows him to make larger moves, effectively allowing him to move faster.
Q11. What is the way to mitigate the risk of a source-location privacy breach?
This suggests that one approach the authors can take to alleviate the risk of a source-location privacy breach is to devise new routing protocols R that introduce more sources that inject fake messages into the network.
Q12. What is the name of the family of routing techniques?
This family of routing techniques is referred to as single-path routing in this paper (e.g., GPSR [18], trajectory-based routing [19], directed diffusion [14], etc).
Q13. How does the hunter detect that he has arrived at a fake source?
By using the fact that the hunter knows that fake sources are used (Kerckhoff’s Principle), the hunter may detect that he has arrived at a fake source because he cannot detect the panda.
Q14. What is the lesson from the study of fake sources?
The lessons learned from the study of fake sources is that, though at an enormous energy cost, fake messaging is nonetheless not effective in protecting the privacy of source locations.