Title :
Source-location privacy for networks of energy-constrained sensors
Author :
Ozturk, Celal ; Zhang, Yanyong ; Trappe, Wade ; Ott, Max
Author_Institution :
Wireless Inf. Network Lab., Rutgers Univ., Piscataway, NJ, USA
Abstract :
Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor´s location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.
Keywords :
ad hoc networks; cryptography; data privacy; routing protocols; systems analysis; telecommunication security; ubiquitous computing; wireless sensor networks; ad hoc network; class offloading protocol; compute-constrained device; content privacy; cryptographic method; data confidentiality; encrypted sensor reading; energy consumption; energy-constrained sensor; hybrid class routing; multihop routing; shortest path routing protocol; source location privacy; system design; ubiquitous computing; wireless sensor network; Computer networks; Cryptography; Data privacy; Energy consumption; Pervasive computing; Protection; Routing protocols; Sensor systems; Ubiquitous computing; Wireless sensor networks;
Conference_Titel :
Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings. Second IEEE Workshop on
Print_ISBN :
0-7695-2123-1
DOI :
10.1109/WSTFES.2004.1300417