DocumentCode :
1389869
Title :
A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
Author :
Mahmoud, Mohamed M E A ; Shen, Xuemin
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Volume :
23
Issue :
10
fYear :
2012
Firstpage :
1805
Lastpage :
1818
Abstract :
In wireless sensor networks, adversaries can make use of the traffic information to locate the monitored objects, e.g., to hunt endangered animals or kill soldiers. In this paper, we first define a hotspot phenomenon that causes an obvious inconsistency in the network traffic pattern due to the large volume of packets originating from a small area. Second, we develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple areas, rather than the entire network or only one area. Using this model, we introduce a novel attack called Hotspot-Locating where the adversary uses traffic analysis techniques to locate hotspots. Finally, we propose a cloud-based scheme for efficiently protecting source nodes´ location privacy against Hotspot-Locating attack by creating a cloud with an irregular shape of fake traffic, to counteract the inconsistency in the traffic pattern and camouflage the source node in the nodes forming the cloud. To reduce the energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than global-adversary-based schemes.
Keywords :
cloud computing; data privacy; telecommunication computing; telecommunication network routing; telecommunication traffic; wireless sensor networks; cloud-based scheme; data transmission; energy cost reduction; fake traffic; global-adversary-based schemes; hotspot-locating attack; network traffic pattern; privacy preservation; realistic adversary model; routing-based schemes; source node location privacy protection; traffic analysis techniques; wireless sensor networks; Correlation; Cryptography; Data privacy; Monitoring; Privacy; Wireless communication; Wireless sensor networks; Wireless sensor network privacy; and anonymity; context privacy; source-location privacy-preserving schemes;
fLanguage :
English
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
Publisher :
ieee
ISSN :
1045-9219
Type :
jour
DOI :
10.1109/TPDS.2011.302
Filename :
6095543
Link To Document :
بازگشت