Protecting Receiver-Location Privacy in Wireless Sensor Networks
Citations Over TimeTop 10% of 2007 papers
Abstract
Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physically. After studying the adversary's behavior patterns, we present countermeasures to this problem. We propose a location-privacy routing protocol (LPR) that is easy to implement and provides path diversity. Combining with fake packet injection, LPR is able to minimize the traffic direction information that an adversary can retrieve from eavesdropping. By making the directions of both incoming and outgoing traffic at a sensor node uniformly distributed, the new defense system makes it very hard for an adversary to perform analysis on locally gathered information and infer the direction to which the receiver locates. We evaluate our defense system based on three criteria: delivery time, privacy protection strength, and energy cost. The simulation results show that LPR with fake packet injection is capable of providing strong protection for the receiver's location privacy. Under similar energy cost, the safe time of the receiver provided by LPR is much longer than other methods, including Phantom routing (Kamat et al., 2005) and DEFP (Deng et al., 2005). The performance of our system can be tuned through a couple of parameters that determine the tradeoff between energy cost and the strength of location-privacy protection.
Related Papers
- → Secret Communication When the Eavesdropper Might Be an Active Adversary(2014)32 cited
- → Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework(2018)2 cited
- → An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective(2019)1 cited
- → Notes On The Design Of An Internet Adversary(2004)3 cited
- → Data Deletion with Time-Aware Adversary Model(2009)