DOI QR코드

DOI QR Code

On Routing for Enhancing Destination-Location Privacy in Wireless Sensor Networks

무선 센서 네트워크에서의 도착지 위치 기밀을 강화하는 라우팅

  • Received : 2010.02.25
  • Accepted : 2010.03.29
  • Published : 2010.07.30

Abstract

In this paper we consider methods for selecting the next tracing node that take advantage of the history of traced positions during the packet-tracing. In the meantime, the proposed routing strategy that counters the tracing is to design the routing path is such a way that nodes on it are not close to the nodes whose location privacy is needed and zigzag or back-and-forth movements hardly take place. In simulations, the ratios of successful tracing were largely improved. It was shown that our routing scheme allows more data packets to be delivered to the destination while, enticing the tracer to move more long distances in the presence of multiple assets.

이 논문에서는 패킷 추적 과정에서 획득한 위치 정보를 이용하여 추적 노드를 결정하는 방안을 고려한다. 한편, 추적에 대응하는 라우팅 전략으로는 위치 보호가 필요한 노드들과 근접하지 않은 노드들로 라우팅 경로를 구성하고, 가능한 경로 궤적이 지그-재그나 앞뒤로 이동하지 않도록 한다. 시뮬레이션을 통해 추적 성공률이 매우 향상됨을 확인 하였고, 제안된 라우팅 기법은 다수의 보호 대상들이 존재하는 환경에서 더 많은 패킷들을 전달하면서도, 추적자로 하여금 더 많은 거리를 이동하도록 유인함을 알 수 있었다.

Keywords

References

  1. N. Li, N. Zhang, S.-K. Das, and B. Thuraisingham "Privacy preservation in wireless sensor networks: a state-of-the-art survey", Ad Hoc Networks, Vol.7, Issue. 8, pp.1501-1514, 2009. https://doi.org/10.1016/j.adhoc.2009.04.009
  2. J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, Vol. 52, No. 12, pp.2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
  3. C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy-constrained sensor network routing," Proc. of the SASN'04, pp.88-93, 2004.
  4. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing," Proc. of the ICDCS'05, pp.599-608, 2005.
  5. 양기원, 임화정, 차영환 "휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅" 한국정보과학회논문지: 정보통신, 제36권, 제1호, pp.12-23, 2009.
  6. Yeonghwan Tscha, "Routing for enhancing source-location privacy in wireless sensor networks of multiple assets," Journal of Communications and Networks, Vol.11, No.6, Dec., pp.589-598, 2009. https://doi.org/10.1109/JCN.2009.6388412
  7. Y. Ouyang, Z. Le, G. Chen, and J. Ford, "Entrapping adversaries for source protection in sensor networks," Proc. of the WoWMoM'06, pp.23-32, 2006.
  8. J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.
  9. Y. Jian, S. Chen, Z. Zhang, L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," Proc. of INFOCOM'07, pp.1955-1963, 2007.
  10. B. Karp and H.-T. Kung, "Greedy perimeter stateless routing for wireless networks," Proc. of the MobiCom'00, pp.243-254, 2000.