Cargando…

Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the sou...

Descripción completa

Detalles Bibliográficos
Autores principales: Bushnag, Anas, Abuzneid, Abdelshakour, Mahmood, Ausif
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4970011/
https://www.ncbi.nlm.nih.gov/pubmed/27355948
http://dx.doi.org/10.3390/s16070957
_version_ 1782445891765927936
author Bushnag, Anas
Abuzneid, Abdelshakour
Mahmood, Ausif
author_facet Bushnag, Anas
Abuzneid, Abdelshakour
Mahmood, Ausif
author_sort Bushnag, Anas
collection PubMed
description Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.
format Online
Article
Text
id pubmed-4970011
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-49700112016-08-04 Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints Bushnag, Anas Abuzneid, Abdelshakour Mahmood, Ausif Sensors (Basel) Article Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. MDPI 2016-06-27 /pmc/articles/PMC4970011/ /pubmed/27355948 http://dx.doi.org/10.3390/s16070957 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Bushnag, Anas
Abuzneid, Abdelshakour
Mahmood, Ausif
Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title_full Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title_fullStr Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title_full_unstemmed Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title_short Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
title_sort source anonymity in wsns against global adversary utilizing low transmission rates with delay constraints
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4970011/
https://www.ncbi.nlm.nih.gov/pubmed/27355948
http://dx.doi.org/10.3390/s16070957
work_keys_str_mv AT bushnaganas sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints
AT abuzneidabdelshakour sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints
AT mahmoodausif sourceanonymityinwsnsagainstglobaladversaryutilizinglowtransmissionrateswithdelayconstraints