Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.3.379

Concealing Communication Source and Destination in Wireless Sensor Networks (Part I) : Protocol Evaluation  

Tscha, Yeong-Hwan (상지대학교 컴퓨터정보공학부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.3, 2013 , pp. 379-387 More about this Journal
Abstract
In large-scale wireless sensor networks, tremendous amount of dummy packets is usually accompanied by keeping location privacy of the communication source and destination against global eavesdropping. In our earlier work we designed a location privacy routing protocol, ELPR(End-node Location Privacy Routing) in which the generation of dummy packets at each idle time-slot while transferring data packets are restricted to only the nodes within certain areas of encompassing the source and destination, respectively. In this paper, it is given that ELPR provides various degrees of location privacy while PCM(Periodic Collection Method) allows the only fixed level. Simulation results show that as the number of nodes or data packets increases ELPR permits in terms of the number of generated packets more cost-effective location privacy than PCM.
Keywords
Global eavesdropping; Location privacy of source and destination; Protocol design and evaluation;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 H. Chen and W. Lou, "From nowhere to somewhere : protecting end-to-end privacy in wireless sensor networks", Proc. of IPCCC'10, pp. 1-8, 2010.
2 양기원, 임화정, 차영환, "휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅", 정보과학회논문지 : 정보통신, 36 권, 1호, pp. 12-23, 2009.
3 이철승, "MANET 기반의 MD5 보안 라우팅에 관한 연구", 한국전자통신학회논문지, 7권, 4호, pp. 797-804, 2012.
4 서우석, 박재표, 전문석, "네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구", 한국전자통신학회논문지, 7권, 1호, pp. 203-211, 2012.
5 정상래, 신현식, "NCW 및 전술데이터링크 기술 개발 현황분석", 한국전자통신학회논문지, 7권, 5호, pp. 991-998, 2012.
6 차병래, 김대규, 김남호, 최세일, 김종원, "클라우드 컴퓨팅 기반 스트리밍 미디어의 검색 가능 이미지 암호 시스템 설계", 한국전자통신학회논문지, 7권, 4호, pp. 811-819, 2012.
7 정우열, 이선근, "근접 통신망의 보안성 향상을 위한 자기키 생성 알고리즘에 관한 연구", 7권, 5호, pp. 1027-1032, 2012.
8 Yeonghwan Tscha, "Routing for enhancing source-location privacy in wireless sensor networks of multiple assets", Journal of Communications and Networks, Vol. 11, No. 6, pp. 589-598, 2009.   DOI   ScienceOn
9 N. Li, N. Zhang, S.-K. Das, and B. Thuraisingham, "Privacy preservation in wireless sensor networks : a state-of-the-art survey", Ad Hoc networks, Vol. 7, pp. 1501-1514, 2009.   DOI   ScienceOn
10 P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing", Proc. of ICDCS'05, pp. 1-10, 2005.
11 Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks", Proc. of INFOCOM'07, pp. 1955-1963, 2007.
12 K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper", IEEE Transaction on Mobile Computing, Vol. 11, No. 2, pp. 320-336, 2012.   DOI   ScienceOn
13 차영환, "무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉: 제1부, 프로토콜 설계", 한국전자통신학회논문지, 8권, 2호, pp. 218-225. 2013.