View Full Document

Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks



View the full content.
View Full Document
View Full Document

4 views

Unformatted text preview:

Preserving Source Location Privacy in Monitoring Based Wireless Sensor Networks Yong Xi Loren Schwiebert and Weisong Shi Wayne State University Department of Computer Science Detroit MI 48202 yongxi loren weisong wayne edu Abstract While a wireless sensor network is deployed to monitor certain events and pinpoint their locations the location information is intended only for legitimate users However an eavesdropper can monitor the traf c and deduce the approximate location of monitored objects in certain situations We rst describe a successful attack against the ooding based phantom routing proposed in the seminal work by Celal Ozturk Yanyong Zhang and Wade Trappe Then we propose GROW Greedy Random Walk a two way random walk i e from both source and sink to reduce the chance an eavesdropper can collect the location information We improve the delivery rate by using local broadcasting and greedy forwarding Privacy protection is veri ed under a backtracking attack model The message delivery time is a little longer than that of the broadcasting based approach but it is still acceptable if we consider the enhanced privacy preserving capability of this new approach At the same time the energy consumption is less than half the energy consumption of ooding base phantom routing which is preferred in a low duty cycle environmental monitoring sensor network 1 Introduction Wireless communication had gained more popularity in recent years The application driven force behind the popularity is easy deployment and mobility Besides the wide applications of wireless local network today emerging applications of wireless communication include wireless sensor networks and Mesh Networks 4 It can be easily seen that wireless networking will gain more popularity and vast information will be carried on wireless networks in the near future However wireless communication media is a broadcast media which poses a big challenge of how to protect infor 1 4244 0054 6 06 20 00 2006 IEEE mation



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?