资源描述:
《Protecting Location Privacy against a global eavesdropper in Sensor.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、320IEEETRANSACTIONSONMOBILECOMPUTING,VOL.11,NO.2,FEBRUARY2012ProtectingLocationPrivacyinSensorNetworksagainstaGlobalEavesdropperKiranMehta,DonggangLiu,Member,IEEE,andMatthewWright,Member,IEEEAbstract—Whilemanyprotocolsforsensornetworksecurityprovideconfidentialityforthecontentofmes
2、sages,contextualinformationusuallyremainsexposed.Suchcontextualinformationcanbeexploitedbyanadversarytoderivesensitiveinformationsuchasthelocationsofmonitoredobjectsanddatasinksinthefield.Attacksonthesecomponentscansignificantlyundermineanynetworkapplication.Existingtechniquesdefen
3、dtheleakageoflocationinformationfromalimitedadversarywhocanonlyobservenetworktrafficinasmallregion.However,astrongeradversary,theglobaleavesdropper,isrealisticandcandefeattheseexistingtechniques.Thispaperfirstformalizesthelocationprivacyissuesinsensornetworksunderthisstrongadversar
4、ymodelandcomputesalowerboundonthecommunicationoverheadneededforachievingagivenleveloflocationprivacy.Thepaperthenproposestwotechniquestoprovidelocationprivacytomonitoredobjects(source-locationprivacy)—periodiccollectionandsourcesimulation—andtwotechniquestoprovidelocationprivacytod
5、atasinks(sink-locationprivacy)—sinksimulationandbackboneflooding.Thesetechniquesprovidetrade-offsbetweenprivacy,communicationcost,andlatency.Throughanalysisandsimulation,wedemonstratethattheproposedtechniquesareefficientandeffectiveforsourceandsink-locationprivacyinsensornetworks.I
6、ndexTerms—Sensornetworks,locationprivacy.Ç1INTRODUCTIONwirelesssensornetwork(WSN)typicallyconsistsofaintermediatesensors.Anadversary(thehunter)mayuseAlargenumberofsmall,multifunctional,andresource-thecommunicationbetweensensorsandthedatasinkstoconstrainedsensorsthatareself-organize
7、dasanadhoclocateandthencapturethemonitoredpandas.Ingeneral,networktomonitorthephysicalworld[1].Sensornetworksanytarget-trackingsensornetworkisvulnerabletosuchareoftenusedinapplicationswhereitisdifficultorattacks.Asanotherexample,inmilitaryapplications,theinfeasibletosetupwirednetwo
8、rks.Examplesincludeenemyca