Title :
Entrapping adversaries for source protection in sensor networks
Author :
Ouyang, Yi ; Le, Zhengyi ; Chen, Guanling ; Ford, James ; Makedon, Fillia
Author_Institution :
Comput. Sci. Dept., Dartmouth Coll., Hanover, NH
Abstract :
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, the privacy of monitored objects\´ locations becomes an important concern. When a sensor reports a monitored object by sending a series of messages through the sensor network, the route these messages take in theory creates a trail leading back to their source. By eavesdropping on communications, an attacker may be able to move from node to node to follow this trail. Several approaches aimed at discouraging this kind of eavesdropping have been proposed, including mechanisms for constructing "phantom" routes and approaches that insert fake sources as background noise. A problem with existing approaches is that message latencies become larger and energy costs become higher as a result of introducing protections for the privacy of a source location. This paper proposes a new cyclic entrapment method (CEM) that protects source locations in sensor networks while adding a comparatively low cost in terms of additional message latency and energy
Keywords :
telecommunication network routing; telecommunication security; wireless sensor networks; CEM; cyclic entrapment method; message routing; sensor network; source protection; Computer science; Computerized monitoring; Costs; Delay; Educational institutions; Intelligent networks; Position measurement; Privacy; Protection; Wireless sensor networks;
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2006. WoWMoM 2006. International Symposium on a
Conference_Location :
Buffalo-Niagara Falls, NY
Print_ISBN :
0-7695-2593-8
DOI :
10.1109/WOWMOM.2006.40