Inspecting the Ways of Source Anonymity in Wireless Sensor Network
Title | Inspecting the Ways of Source Anonymity in Wireless Sensor Network |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Shinganjude, R.D., Theng, D.P. |
Conference Name | Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on |
Date Published | April |
Keywords | adversarial assumptions, anonymity, coding theory, Communication systems, event source anonymity, LSB steganography technique, network traffic, persistent dummy traffic, source location privacy, statistical test, steganography, telecommunication traffic, Wireless Sensor Network, Wireless sensor networks |
Abstract | Sensor networks mainly deployed to monitor and report real events, and thus it is very difficult and expensive to achieve event source anonymity for it, as sensor networks are very limited in resources. Data obscurity i.e. the source anonymity problem implies that an unauthorized observer must be unable to detect the origin of events by analyzing the network traffic; this problem has emerged as an important topic in the security of wireless sensor networks. This work inspects the different approaches carried for attaining the source anonymity in wireless sensor network, with variety of techniques based on different adversarial assumptions. The approach meeting the best result in source anonymity is proposed for further improvement in the source location privacy. The paper suggests the implementation of most prominent and effective LSB Steganography technique for the improvement. |
URL | http://ieeexplore.ieee.org/document/6821490/ |
DOI | 10.1109/CSNT.2014.148 |
Citation Key | 6821490 |