Cargando…
Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the sou...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4970011/ https://www.ncbi.nlm.nih.gov/pubmed/27355948 http://dx.doi.org/10.3390/s16070957 |
_version_ | 1782445891765927936 |
---|---|
author | Bushnag, Anas Abuzneid, Abdelshakour Mahmood, Ausif |
author_facet | Bushnag, Anas Abuzneid, Abdelshakour Mahmood, Ausif |
author_sort | Bushnag, Anas |
collection | PubMed |
description | Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. |
format | Online Article Text |
id | pubmed-4970011 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-49700112016-08-04 Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints Bushnag, Anas Abuzneid, Abdelshakour Mahmood, Ausif Sensors (Basel) Article Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. MDPI 2016-06-27 /pmc/articles/PMC4970011/ /pubmed/27355948 http://dx.doi.org/10.3390/s16070957 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Bushnag, Anas Abuzneid, Abdelshakour Mahmood, Ausif Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title | Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title_full | Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title_fullStr | Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title_full_unstemmed | Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title_short | Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints |
title_sort | source anonymity in wsns against global adversary utilizing low transmission rates with delay constraints |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4970011/ https://www.ncbi.nlm.nih.gov/pubmed/27355948 http://dx.doi.org/10.3390/s16070957 |
work_keys_str_mv | AT bushnaganas sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints AT abuzneidabdelshakour sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints AT mahmoodausif sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints |