Browse > Article
http://dx.doi.org/10.13067/JKIECS.2016.11.9.861

Generation of Dummy Messages Depending Upon the Location Privacy Level in Sensor Networks  

Tscha, Yeong-Hwan (Dept. of Computer Science and Engineering, Sangji University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.11, no.9, 2016 , pp. 861-868 More about this Journal
Abstract
Dummy messages are usually generated for faking in preserving the location privacy of a sink or source against the global eavesdropping in wireless networks. In this paper, we propose a new method in which a certain number of nodes determined by considering the required privacy level are made to transit to the dormant state doing nothing so that the total number of dummy messages is reduced, while the paths from the sink to the sources are ensured. Through simulation we verify the success ratio of path establishments between the sink and a set of sources and the location privacy level of them.
Keywords
Dummy Message; Global Eavesdropping; Location Privacy in Sensor Networks; Protocol Design;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of Int. Conf. on Distributed Computing System 2005, Columbus, Ohio, USA, June 6-9, 2005, pp.1-10.
2 Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of IEEE (INFOCOM) Int. Conf. on Computer Communications 2007, Anchorage, Alaska, USA, May 6-12, 2007, pp. 1955-1963.
3 K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320-336.   DOI
4 Y. Tscha, "Concealing communication paths in wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 1, 2014, pp. 115-130.
5 Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, and Fillia Makedon, "Source location privacy against laptop-class attacks in sensor networks," In Proc. of ACM 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22-25, 2008, pp. 5-14.
6 M. Yon and Y. Him, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897.   DOI
7 K. Kim, B. Kim, S. Bae, and D. Kim, "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
8 C. See, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.