On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Published : 2009.03.31

Abstract

Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

Keywords

References

  1. C. Karlof and D. Wagner ,'Secure routing in wireless sensor networks: attacks and countermeasures', Ad Hoc Networks, Vol.1, No.1, pp.293-315, 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
  2. J. Yick, B. Mukherjee, and D. Ghosal, 'Wireless sensor network survey,' Computer Networks, Vol. 52, No.12, pp.2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
  3. C. Ozturk, Y. Zhang, and W. Trappe, 'Source-location privacy in energy-constrained sensor network routing,' Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.88-93, 2004.
  4. J. Deng, R. Han, and S. Mishra, 'Countermeasures against traffic analysis attacks in wireless sensor networks,' Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.
  5. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, 'Enhancing source-location privacy in sensor network routing,' Proc. of the 25th IEEE International Conference on Distributed Computing Systems, pp.599-608, 2005.
  6. L. Zhang, 'A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing,' Proc. of the ACM International Wireless Communication and Mobile Computing Conference, pp.33-38, 2006.
  7. Y. Jian, S. Chen, Z. Zhang, L. Zhang, 'Protecting receiver-location privacy in wireless sensor networks,' Proc. of the 26th IEEE Conference on Computer Communications, pp.1955-1963, 2007.
  8. G.-W. Yang, H.-J. Lim, Y. Tscha, 'Location privacy enhanced routing for sensor networks in the presence of dormant sources,' Journal of KIISE: Information Networking, Vol.36, No.1, pp.12-23, 2008.
  9. Y. Tscha, 'Routing for enhancing source-location privacy with low delivery latency in sensor networks,' The Journal of Korea Information and Communication Society, Vol.33, No.8, pp.636-645, 2008.
  10. K. Mehta, D. Lie, and M. Wright, 2007, Location privacy in sensor networks against a global eavesdropper, Proc. of the 15th IEEE International Conference on Network Protocols: Session VIII, #4
  11. Y. Ouyang, Z. Le, G. Chen, and J. Ford, 'Entrapping adversaries for source protection in sensor networks,' Proc. of the 7th IEEE International Symposium on a Word of Wireless, Mobile and Multimedia Networks, pp.23-32, 2006 https://doi.org/10.1109/WOWMOM.2006.40
  12. S. Puthenpurayil, R. Gu, and S. S. Bhattacharyya, 'Energy-aware data compression for wireless sensor networks,' Proc. of the International Conference on Acoustics, Speech, and Signal Processing, Vol.2, pp.45-48, 2007.
  13. Y.-B. Ko and N. Vaidya, 'Geocasting in mobile ad hoc networks: location-based multicast algorithms,' Proc. of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.101-110, 1999
  14. K. Obraczka, K. Viswanath, and G. Tsudik, 'Flooding for reliable multicast in multi-hop ad hoc networks,' Wireless Networks, Vol.7, pp.627-634, 2001 https://doi.org/10.1023/A:1012323519059
  15. B. Karp and H.-T. Kung, 'Greedy perimeter stateless routing for wireless networks,' Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.243-254, 2000.
  16. P. Bose, P. Morin, I. Stojmenovic and J. Urrutia, 'Routing with guaranteed delivery in ad hoc wireless networks,' Proc. of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp.48-55, 1999
  17. R, Nelson and L. Kleinrock, 'The spatial capacity of a slotted aloha multihop packet radio network with capture,' IEEE Transaction on Communications, Vol.32, No.6, pp.684-694, 1984. https://doi.org/10.1109/TCOM.1984.1096124