Cargando…
Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in m...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4435140/ https://www.ncbi.nlm.nih.gov/pubmed/25763649 http://dx.doi.org/10.3390/s150305820 |
_version_ | 1782371859660013568 |
---|---|
author | Abuzneid, Abdel-Shakour Sobh, Tarek Faezipour, Miad Mahmood, Ausif James, John |
author_facet | Abuzneid, Abdel-Shakour Sobh, Tarek Faezipour, Miad Mahmood, Ausif James, John |
author_sort | Abuzneid, Abdel-Shakour |
collection | PubMed |
description | Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN. |
format | Online Article Text |
id | pubmed-4435140 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-44351402015-05-19 Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach Abuzneid, Abdel-Shakour Sobh, Tarek Faezipour, Miad Mahmood, Ausif James, John Sensors (Basel) Article Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN. MDPI 2015-03-10 /pmc/articles/PMC4435140/ /pubmed/25763649 http://dx.doi.org/10.3390/s150305820 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Abuzneid, Abdel-Shakour Sobh, Tarek Faezipour, Miad Mahmood, Ausif James, John Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title | Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title_full | Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title_fullStr | Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title_full_unstemmed | Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title_short | Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach |
title_sort | fortified anonymous communication protocol for location privacy in wsn: a modular approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4435140/ https://www.ncbi.nlm.nih.gov/pubmed/25763649 http://dx.doi.org/10.3390/s150305820 |
work_keys_str_mv | AT abuzneidabdelshakour fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach AT sobhtarek fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach AT faezipourmiad fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach AT mahmoodausif fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach AT jamesjohn fortifiedanonymouscommunicationprotocolforlocationprivacyinwsnamodularapproach |