Abstract
The open nature of communications in Wireless Sensor Networks (WSNs) makes it easy for an adversary to trace all the communications within the network. If techniques such as encryption may be employed to protect data privacy (i.e. the content of a message), countermeasures to deceive context privacy (e.g. the source of a message) are much less straightforward. In recent years, the research community addressed the problem of context privacy. Some work aimed to hide the position of the collecting node. Other work investigated on hiding the position of an event—sensed by the WSN. However, the solutions proposed for events hiding either: (i) considered only static events; (ii) are not efficient. In this work, we describe open issues that we identified in the current research. In particular, we consider the problem of efficiently hiding mobile events.
Chapter PDF
Similar content being viewed by others
References
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), pp. 51–55 (2008)
Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 1501–1514 (2009)
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 2045–2053 (2007)
Conti, M., Zhang, L., Roy, S., Di Pietro, R., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2, 195–213 (2009)
Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), pp. 77–88 (2006)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88–93 (2004)
Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, p. 202. Springer, Heidelberg (2006)
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955–1963 (2007)
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), pp. 314–323 (2007)
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec 2008), pp. 77–88 (2008)
Ouyang, Y., Le, Z., Liu, D., Ford, J., Makedon, F.: Source location privacy against laptop-class attacks in sensor networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), pp. 1–10 (2008)
Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source location privacy: Analysis and countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 19, pp. 373–393. Springer, Heidelberg (2009)
Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing anonymity in wireless sensor networks. In: IEEE International Conference on Pervasive Services, pp. 145–148 (2007)
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 184–188. Springer, Heidelberg (2003)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems 10, 557–570 (2002)
von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 122–130 (2003)
Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5, 128–143 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ortolani, S., Conti, M., Crispo, B., Di Pietro, R. (2011). Event Handoff Unobservability in WSN. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19228-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-19228-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19227-2
Online ISBN: 978-3-642-19228-9
eBook Packages: Computer ScienceComputer Science (R0)