Visible to the public Inspecting the Ways of Source Anonymity in Wireless Sensor Network

TitleInspecting the Ways of Source Anonymity in Wireless Sensor Network
Publication TypeConference Paper
Year of Publication2014
AuthorsShinganjude, R.D., Theng, D.P.
Conference NameCommunication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
Date PublishedApril
Keywordsadversarial assumptions, anonymity, coding theory, Communication systems, event source anonymity, LSB steganography technique, network traffic, persistent dummy traffic, source location privacy, statistical test, steganography, telecommunication traffic, Wireless Sensor Network, Wireless sensor networks
Abstract

Sensor networks mainly deployed to monitor and report real events, and thus it is very difficult and expensive to achieve event source anonymity for it, as sensor networks are very limited in resources. Data obscurity i.e. the source anonymity problem implies that an unauthorized observer must be unable to detect the origin of events by analyzing the network traffic; this problem has emerged as an important topic in the security of wireless sensor networks. This work inspects the different approaches carried for attaining the source anonymity in wireless sensor network, with variety of techniques based on different adversarial assumptions. The approach meeting the best result in source anonymity is proposed for further improvement in the source location privacy. The paper suggests the implementation of most prominent and effective LSB Steganography technique for the improvement.

URLhttp://ieeexplore.ieee.org/document/6821490/
DOI10.1109/CSNT.2014.148
Citation Key6821490