Browse > Article
http://dx.doi.org/10.13067/JKIECS.2020.15.3.433

On Concealing Data-Path Against Eavesdropping in Wireless Networks  

Tscha, Yeong-Hwan (Dept. of Computer Engineering, Sangji University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.15, no.3, 2020 , pp. 433-438 More about this Journal
Abstract
Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.
Keywords
Packet Transfer Protocol; Location-Privacy; Protocol Design;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of Int. Conf. on Distributed Computing System 2005, Columbus, Ohio, USA, June 2005, pp. 1-10.
2 K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320-336.   DOI
3 Y. Tscha, "Concealing communication paths in wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 1, 2014, pp. 115-130.
4 Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, "Source location privacy against laptop-class attacks in sensor networks," In Proc. of ACM 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, Sept. 2008, pp. 5-14.
5 Y. Tscha, "Generation of dummy messages depending upon the location privacy level in sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 9, 2016, pp. 861-867.   DOI
6 M. Yon and Y. Him, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897.   DOI
7 K. Kim, B. Kim, S. Bae, and D. Kim, "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
8 C. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.   DOI
9 Y. Dalal and R. Metcalfe, "Reverse path forwarding of broadcast packets," Communications of the ACM, vol. 21, no. 12, Dec. 1978, pp. 1040-1048.   DOI
10 C. Lee, "Design by improved energy efficiency MAC protocol based on wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 3, 2017, pp. 439-444.   DOI
11 Y. Kwon, T. Kim, and J. Choi "TDMA-based low power mac protocol design of wireless sensor networks for vehicle detection," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 5, 2018, pp. 1003-1010.   DOI