Cargando…

Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in m...

Descripción completa

Detalles Bibliográficos
Autores principales: Abuzneid, Abdel-Shakour, Sobh, Tarek, Faezipour, Miad, Mahmood, Ausif, James, John
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4435140/
https://www.ncbi.nlm.nih.gov/pubmed/25763649
http://dx.doi.org/10.3390/s150305820
_version_ 1782371859660013568
author Abuzneid, Abdel-Shakour
Sobh, Tarek
Faezipour, Miad
Mahmood, Ausif
James, John
author_facet Abuzneid, Abdel-Shakour
Sobh, Tarek
Faezipour, Miad
Mahmood, Ausif
James, John
author_sort Abuzneid, Abdel-Shakour
collection PubMed
description Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.
format Online
Article
Text
id pubmed-4435140
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-44351402015-05-19 Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach Abuzneid, Abdel-Shakour Sobh, Tarek Faezipour, Miad Mahmood, Ausif James, John Sensors (Basel) Article Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN. MDPI 2015-03-10 /pmc/articles/PMC4435140/ /pubmed/25763649 http://dx.doi.org/10.3390/s150305820 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Abuzneid, Abdel-Shakour
Sobh, Tarek
Faezipour, Miad
Mahmood, Ausif
James, John
Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title_full Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title_fullStr Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title_full_unstemmed Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title_short Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
title_sort fortified anonymous communication protocol for location privacy in wsn: a modular approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4435140/
https://www.ncbi.nlm.nih.gov/pubmed/25763649
http://dx.doi.org/10.3390/s150305820
work_keys_str_mv AT abuzneidabdelshakour fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach
AT sobhtarek fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach
AT faezipourmiad fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach
AT mahmoodausif fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach
AT jamesjohn fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach