OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Title | OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Xiaoguang Niu, Chuanbo Wei, Weijiang Feng, Qianyuan Chen |
Conference Name | Wireless Communications and Networking Conference (WCNC), 2014 IEEE |
Date Published | April |
Keywords | Base stations, challenging attack model, cluster-based wireless sensor network, data privacy, delay sensitive wireless sensor networks, delays, event source anonymity, event source location privacy, fake packet injection, global attacker, Mobile communication, mobile computing, network traffic, network traffic reduction, optimal cluster based source anonymity protocol, OSAP, Protocols, real event report latency, security, source anonymity, telecommunication security, telecommunication traffic, wireless networks, Wireless sensor networks |
Abstract | For wireless sensor networks deployed to monitor and report real events, event source-location privacy (SLP) is a critical security property. Previous work has proposed schemes based on fake packet injection such as FitProbRate and TFS, to realize event source anonymity for sensor networks under a challenging attack model where a global attacker is able to monitor the traffic in the entire network. Although these schemes can well protect the SLP, there exists imbalance in traffic or delay. In this paper, we propose an Optimal-cluster-based Source Anonymity Protocol (OSAP), which can achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of unequal clusters, to reduce the network traffic. The simulation results demonstrate that OSAP can significantly reduce the network traffic and the delay meets the system requirement. |
URL | http://ieeexplore.ieee.org/document/6952906/ |
DOI | 10.1109/WCNC.2014.6952906 |
Citation Key | 6952906 |
- network traffic
- wireless sensor networks
- wireless networks
- telecommunication traffic
- telecommunication security
- source anonymity
- security
- real event report latency
- Protocols
- OSAP
- optimal cluster based source anonymity protocol
- network traffic reduction
- Base stations
- mobile computing
- Mobile communication
- global attacker
- fake packet injection
- event source location privacy
- event source anonymity
- delays
- delay sensitive wireless sensor networks
- data privacy
- cluster-based wireless sensor network
- challenging attack model