Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat,

Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Natalia Stakhanova cs610 Sensor networks Security threats concerns with data security necessity to protect content of the data packages transferred through the network

privacy threats associated with sensors devices necessity to secure the transmission of the data, for ex. location of the sensor node providing particular information Presented work addresses this issue Example: pander-hunter game Sensors are monitoring the habitat of pandas

once panda is observed - the information is reported to the base station hunter desires to capture panda Assumptions one panda, one hunter and one base station hunter is equipped with rich memory and power resources and is able to identify the immediate sender knowing signal strength and the angle of the arrived message Privacy metrics

the safety period number of messages initiated by the sensor monitoring the panda. the capture likelihood the probability that hunter can capture panda within a specified time period. Considered routing protocols

Two baseline techniques flooding message is broadcasted to all neighbors single-path routing message is routed to one of the neighbors Improvements for these techniques

each technique is associated with behavioral hunter model Performance: baseline routing protocols The safety period is the same as the length of the shortest routing path. Patient hunter model hunter waits at the base station for message moves to the immediate sender of that message repeats until reaches the source node flooding single-path routing The

capture likelihood is high with single source routing, much lower with probabilistic routing Improvement: routing with fake sources introduce new sources that inject fake messages into the network two challenges: How to chose fake source Rate of fake messaging

Routing with fake sources Fake source source is h hops away, sends message to the sink sink sends a message into opposite direction once message reached node in h hops away from sink it becomes a fake source Rate of fake messaging

Slow rate hunter finds the real source fast At the rate of the real messaging hunter struggles between fake and real source High rate hunter is kept at the fake source real source fake source Performance: routing with fake sources

Fast speed of fake messaging provides good privacy! But it wont work for more sophisticated hunter Perceptive hunter model hunter is able to detect deception for ex. can keep the history of visited nodes Improvement: phantom routing Introduces two phases:

random walk message is routed in random fashion for h hops flooding/single-path routing after h hops message is routed using baseline technique Random walk Flooding Phantom routing: further improvement

Pure random walk might not be efficient directed random walk a sector based directed random walk each node partitions neighbors into two sets S1, S2 (for ex. east/west) if message is sent to node in S1, then every node forwards it to the neighbors in set S1 only a hop-based directed random walk must know the hop count between sink and all nodes partition node into 2 sets: with hop count <

mine and > mine Performance: phantom routing Safety period for phantom single-source routing is higher than for phantom flooding single-path routing flooding Why: probability in single-source routing that message will intersect hunters path is small

in flooding this probability is still large Performance: phantom routing The capture likelihood - number of transmissions per message increases linearly for both techniques flooding However single-path routing Safety period increase is more dramatic So combined -> more

privacy Performance: phantom routing Caution hunter model hunter limits its listening time at node after timeout hunter returns to the previous node However does not provide more benefits hunter does not make much progress towards the real source Safety period is higher, while capture likelihood is lower Privacy in mobile sensor network

Mobility adds privacy Fast moving panda alone is sufficient to provide source privacy using single-source routing In phantom routing the privacy increases Conclusion Majority of the research efforts are focused on data security

There are some works on protecting privacy associated with network devices not appropriate for sensor networks This is one of the first efforts to address sensor location privacy in sensor network ???

Recently Viewed Presentations

  • UNIX - soria-carrasco.staff.shef.ac.uk

    UNIX - soria-carrasco.staff.shef.ac.uk

    On Iceberg Michael Griffiths and Deniz Savas Corporate Information and Computing Services The University of Sheffield www.sheffield.ac.uk/wrgrid
  • Applied Geometry - shr2.k12.mo.us

    Applied Geometry - shr2.k12.mo.us

    Geometry Lesson 2 - 5 Postulates and Paragraph Proofs Objective: Identify and use basic postulates about points, lines, and planes. Write paragraph proofs. Postulate Postulate (or axiom) - a statement that is accepted as true without proof. Postulates Postulate 2.1...
  • Telling Addressing Charlottes U.S. an Spelling Web Geography

    Telling Addressing Charlottes U.S. an Spelling Web Geography

    100 What type of clock is this? What is… digital ? 200 Does the short hand point to the hour or to the minute? What is… the hour ? 300 How many minutes are in an hour? What is… 60...
  • Health Disparities Grant Program

    Health Disparities Grant Program

    Office of Health Equity. This presentation will provide… This presentation is designed for program managers and fiscal staff working on the Health Disparities Grant Program. Important program concepts regarding managing the contract, meeting the terms of the Statement of Work,...
  • Character Analysis

    Character Analysis

    Conclusion. Use the THESIS sentence frame and your ASSERTIONS to complete your concluding paragraph. In conclusion, in the short story, "Attack of the Jolly Green Giant, the author, Peter Sieruta develops a dynamic character as David goes from being inconsiderate...
  • The Periodic Law

    The Periodic Law

    History of the Periodic Table. Periodicity or the periodic law states that the physical and chemical properties of the elements are functions of their atomic numbers - when elements are arranged in order of increasing atomic number, elements with similar...
  • In the Business of….?

    In the Business of….?

    If students have internet access, you may want to send them to the instructions to find the correct income and tax liability. Otherwise, you may want to give students a copy of page 70 showing the contents of the tax...
  • Welcome to Grants Accounting - Hillsborough Community College

    Welcome to Grants Accounting - Hillsborough Community College

    HCC conforms to the State Accounting Manual for Florida's Community Colleges. The Manual provides the Basic Coding System: XX-XXXXXXXX-XXXXX-XX. Fund-Department-Object Code-Location. Charts Of Accounts