Source-location privacy for networks of energy-constrained sensors

Celal Öztürk, Yanyong Zhang, W. Trappe, M. Ott
{"title":"Source-location privacy for networks of energy-constrained sensors","authors":"Celal Öztürk, Yanyong Zhang, W. Trappe, M. Ott","doi":"10.1109/WSTFEUS.2004.10012","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor's location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.","PeriodicalId":170872,"journal":{"name":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2004-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WSTFEUS.2004.10012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 50

Abstract

Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor's location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
能量受限传感器网络的源位置隐私
无线传感器网络目前正在研究无处不在的计算应用。隐私是这些网络的一个关键问题,因为对手可能能够窃听或观察传感器数据的存在,以推断不打算透露的信息。构成传感器网络的设备是低功耗、计算受限的设备。任何隐私解决方案都应该仔细考虑支持位置隐私和能源消耗之间的权衡。我们探讨了两类主要的隐私问题:内容隐私和发信人位置隐私。可以通过提供数据机密性的传统加密方法来维护内容隐私。我们简要讨论了系统设计技术,这些技术可以防止攻击者从多个消息中关联观察结果来推断加密传感器读数的内容。然后,我们通过研究ad hoc网络的几种多跳路由机制来研究保护原始传感器位置的问题。我们将重点讨论三类路由协议:最短路径路由协议类、卸载协议类和混合路由类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A fault-tolerant technique for scheduling periodic tasks in real-time systems XML as a basis for interoperability in real time distributed systems Introduction to the "uAuto" project - ubiquitous autonomic computing and network A new middleware architecture for ubiquitous computing environment An intelligent agent for ubiquitous computing environments: smart home UT-AGENT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1