STaR: design and quantitative measurement of source-location privacy for wireless sensor networks

Lightfoot, Leron; Li, Yun; Ren, Jian
February 2016
Security & Communication Networks;Feb2016, Vol. 9 Issue 3, p220
Academic Journal
Wireless sensor networks (WSNs) can provide the world with a technology for real-time event monitoring. One of the primary concerns that hinder the successful deployment of WSNs is source-location privacy (SLP). The privacy of the source location is vital and highly jeopardized by the usage of wireless communications. Although message content privacy can be ensured through message encryption, it is much more difficult to adequately address the SLP. For WSNs, SLP service is further complex by the fact that sensors consist of low-cost and energy-efficient radio devices. Therefore, using computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large-scale broadcasting-based protocols are not suitable for WSNs. In this paper, we analyze the quantitatively measure source-location information leakage in routing-based SLP protection schemes for WSNs. Through this model, we identify vulnerabilities of some well-known SLP protection schemes. We also propose a routing technique, called the Sink Toroidal Region (STaR), to provide adequate SLP with low energy consumption. With this routing technique, the source node randomly selects an intermediate node within a designed STaR area located around the sink node. Furthermore, this routing protocol ensures that the intermediate node is neither too close, nor too far from the sink node in relations to the entire network. While ensuring SLP, our simulation results show that the proposed scheme is very efficient and can be used for practical applications. Copyright © 2012 John Wiley & Sons, Ltd.


Related Articles

  • Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks. Sharma, Gaurav; Bala, Suman; Verma, Anil // Wireless Personal Communications;Sep2015, Vol. 84 Issue 2, p1469 

    Signcryption is a novel cryptographic primitive, which enables a user to perform digital signature (providing authenticity) and public key encryption (providing message confidentiality) simultaneously in a single logical step with a cost lesser than sign-then-encrypt approach. Without revealing...

  • A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks. Huang, Jie; Huang, Bei // Security & Communication Networks;Aug2014, Vol. 7 Issue 8, p1189 

    ABSTRACT In wireless sensor networks (WSNs), due to low cost, limited resource, and large scale, symmetric key-based key pre-distribution schemes are considered to be very suitable, but they cannot thoroughly solve authentication problem and resilience problem against physical capture. So, some...

  • Efficient online/offline identity-based signature for wireless sensor network. Liu, Joseph; Baek, Joonsang; Zhou, Jianying; Yang, Yanjiang; Wong, Jun // International Journal of Information Security;Aug2010, Vol. 9 Issue 4, p287 

    In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSN environment with severely constrained resources. One...

  • Efficient and Non-Interactive Hierarchical Key Agreement in WSNs. Hyunsung Kim // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p159 

    Wireless sensor networks (WSNs) have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes used are resource-constrained,...

  • A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks. Huang Jie; Ou Guohua // Adhoc & Sensor Wireless Networks;2012, Vol. 16 Issue 1-3, p45 

    Wireless sensor networks are often deployed in no man's land or hostile environments, therefore, exchange messages between sensors must be encrypted by symmetric key to protect sensitive data. Due to low cost, symmetric key-based key pre-distribution schemes are considered very suitable for...

  • An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks. IN TAE KIM; SEONG OUN HWANG; AND SEUNGWOON KIM // Adhoc & Sensor Wireless Networks;2012, Vol. 14 Issue 1/2, p27 

    Previous identily-based broadcast encryption schemes have mainly focused on reducing the ciphertext and key size. These efforts have resulted in computation and/or storage overhead on a user's side. Therefore, they are not suitable for wireless sensor networks which arc very limited in...

  • KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS. Shnaikat, Khawla Naji; AlQudah, Ayman Ahmed // International Journal of Network Security & Its Applications;Nov2014, Vol. 6 Issue 6, p49 

    The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of...

  • Light-weight framework for security-sensitive wireless sensor networks applications. Jokhio, Sana H.; Jokhio, Imran Ali; Kemp, Andrew H. // IET Wireless Sensor Systems;Dec2013, Vol. 3 Issue 4, p298 

    For certain security-sensitive wireless sensor network (WSN) applications, physical location information of the sensor nodes must not be disclosed to any unauthorised entity. During the localisation phase for such applications the physical locations of sensor nodes are kept secret. Globally, a...

  • Cutting-Edge Security. Crowe, David // Wireless Review;01/01/2001, Vol. 18 Issue 1, p40 

    Provides information on public-key encryption and private-key encryption as security systems for use in wireless business. Advantages and disadvantages of public-key encryption and private-key encryption; Authenticity of wireless security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics