Download presentation
Presentation is loading. Please wait.
Published byJayson Davidson Modified over 9 years ago
1
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Natalia Stakhanova cs610
2
Sensor networks Security threats concerns with data security necessity to protect content of the data packages transferred through the network privacy threats associated with sensors devices necessity to secure the transmission of the data, for ex. location of the sensor node providing particular information Presented work addresses this issue
3
Example: pander-hunter game Sensors are monitoring the habitat of pandas once panda is observed - the information is reported to the base station hunter desires to capture panda Assumptions one panda, one hunter and one base station hunter is equipped with rich memory and power resources and is able to identify the immediate sender knowing signal strength and the angle of the arrived message
4
Privacy metrics the safety period number of messages initiated by the sensor monitoring the panda. the capture likelihood the probability that hunter can capture panda within a specified time period.
5
Considered routing protocols Two baseline techniques flooding message is broadcasted to all neighbors single-path routing message is routed to one of the neighbors Improvements for these techniques each technique is associated with behavioral hunter model
6
Performance: baseline routing protocols Patient hunter model hunter waits at the base station for message moves to the immediate sender of that message repeats until reaches the source node The safety period is the same as the length of the shortest routing path. single-path routing flooding The capture likelihood is high with single source routing, much lower with probabilistic routing
7
Improvement: routing with fake sources introduce new sources that inject fake messages into the network two challenges: How to chose fake source Rate of fake messaging
8
Routing with fake sources Fake source source is h hops away, sends message to the sink sink sends a message into opposite direction once message reached node in h hops away from sink it becomes a fake source Rate of fake messaging Slow rate → hunter finds the real source fast At the rate of the real messaging → hunter struggles between fake and real source High rate → hunter is kept at the fake source fake source real source
9
Performance: routing with fake sources Fast speed of fake messaging provides good privacy! … But it won’t work for more sophisticated hunter Perceptive hunter model hunter is able to detect deception for ex. can keep the history of visited nodes
10
Improvement: phantom routing Introduces two phases: random walk message is routed in random fashion for h hops flooding/single-path routing after h hops message is routed using baseline technique Random walk Flooding
11
Phantom routing: further improvement Pure random walk might not be efficient → directed random walk a sector based directed random walk each node partitions neighbors into two sets S1, S2 (for ex. east/west) if message is sent to node in S1, then every node forwards it to the neighbors in set S1 only a hop-based directed random walk must know the hop count between sink and all nodes partition node into 2 sets: with hop count mine
12
Performance: phantom routing Safety period for phantom single-source routing is higher than for phantom flooding single-path routing flooding Why: probability in single-source routing that message will intersect hunter’s path is small in flooding this probability is still large
13
Performance: phantom routing The capture likelihood - number of transmissions per message increases linearly for both techniques single-path routing flooding However Safety period increase is more dramatic So combined -> more privacy
14
Performance: phantom routing Caution hunter model hunter limits its listening time at node after timeout hunter returns to the previous node However … does not provide more benefits hunter does not make much progress towards the real source Safety period is higher, while capture likelihood is lower
15
Privacy in mobile sensor network Mobility adds privacy Fast moving panda alone is sufficient to provide source privacy using single-source routing In phantom routing the privacy increases
16
Conclusion Majority of the research efforts are focused on data security There are some works on protecting privacy associated with network devices not appropriate for sensor networks This is one of the first efforts to address sensor location privacy in sensor network
17
???
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.