Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.12.1353

Concealing Communication Paths in Wireless Sensor Networks  

Tscha, Yeong-Hwan (상지대학교 컴퓨터정보공학부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.12, 2014 , pp. 1353-1358 More about this Journal
Abstract
Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.
Keywords
Global Eavesdropping; Location privacy of Communication Nodes; Protocol Design and Verification;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of The 25th Int. Conf. on Distributed Computing Systems, Columbus, OH, Apr. 2005, pp. 1-10.
2 Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of 26th Annual IEEE Conf. on Computer Communications IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp. 1955-1963.
3 K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320- 336.   DOI
4 E. Ngai and I. Rodhe, "On providing location privacy for mobile sinks in wireless sensor networks," Wireless Networks, vol. 19, no. 1, 2013, pp. 115-130.   DOI
5 C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.   과학기술학회마을
6 Y. Tscha, "Concealing communication source and destination in wireless sensor networks(Part I): Protocol Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 2, 2013, pp. 219-226.   과학기술학회마을   DOI
7 M.-Y. Son and Y.-H. Kim, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897.   과학기술학회마을   DOI
8 K. Kim, B. Kim, S. Bae, and D. Kim "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.   과학기술학회마을