Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.2.219

Concealing Communication Source and Destination in Wireless Sensor Networks(Part I) : Protocol Design  

Tscha, Yeong-Hwan (상지대학교 컴퓨터정보공학부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.2, 2013 , pp. 219-226 More about this Journal
Abstract
Against the global eavesdropping in wireless sensor networks, tremendous amount of dummy packets for faking are likely to be continuously generated in order to keep the location privacy of the communication source and destination. In our approach only certain disk-shaped zones of encompassing sources and destination are allowed to issue dummy packets during the data transfer so that the amount of generated packets is reduced while the location privacy of the source and destination remains secret. To this end we design a routing protocol and propose a detailed formal specification of it, and verify major characteristics.
Keywords
Global eavesdropping; Location privacy of source and destination; protocol design and verification;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 N. Li, N. Zhang, S.-K. Das, and B. Thuraisingham, "Privacy preservation in wireless sensor networks : a state-of-the-art survey", Ad Hoc networks, Vol. 7, pp. 1501-1514, 2009.   DOI   ScienceOn
2 P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing", Proc. of ICDCS'05, pp. 1-10, 2005.
3 Y. Quyang, Z. Le, D. Liu, J. Ford, and F. Makedon, "Source-location privacy laptop-class attacks in sensor networks", Proc. of SecureComm' 08, Paper No. 44, 2008.
4 Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks", Proc. of INFOCOM' 07, pp. 1955-1963, 2007.
5 H. Chen and W. Lou, "From nowhere to somewhere: protecting end-to-end privacy in wireless sensor networks", Proc. of IPCCC'10, pp. 1-8, 2010.
6 K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper", IEEE Transaction on Mobile Computing, Vol. 11, No. 2, pp. 320- 336, 2012.   DOI   ScienceOn
7 이철승, "MANET 기반의 MD5 보안 라우팅에 관한 연구", 한국전자통신학회논문지, 7권, 4호, pp. 797-804, 2012.
8 서우석, 박재표, 전문석, "네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구", 한국전자통신학회논문지, 7권, 1호, pp. 203-211, 2012.
9 정상래, 신현식, "NCW 및 전술데이터링크 기술 개발 현황분석", 한국전자통신학회논문지, 7권, 5호, pp. 991-998, 2012.
10 정상래, 신현식, "스마트폰의 사용자 경험이 만족에 미치는 영향 연구", 한국전자통신학회논문지, 7권, 5호, pp. 1087-1093, 2012.
11 차병래, 김대규, 김남호, 최세일, 김종원, "클라우드 컴퓨팅 기반 스트리밍 미디어의 검색 가능 이미지 암호 시스템 설계", 한국전자통신학회논문지, 7권, 4호, pp. 811-819, 2012.
12 정우열, 이선근, "근접 통신망의 보안성 향상을 위한 자기키 생성 알고리즘에 관한 연구", 한국전자통신학회논문지, 7권, 5호, pp. 1027-1032, 2012.