DOI QR코드

DOI QR Code

Concealing Communication Paths in Wireless Sensor Networks

무선 센서 네트워크에서의 통신 경로 은닉

  • 차영환 (상지대학교 컴퓨터정보공학부)
  • Received : 2014.09.30
  • Accepted : 2014.12.15
  • Published : 2014.12.31

Abstract

Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.

무선 센서 네트워크에 대한 전역 도청에 대응하여 통신 경로 상의 노드들을 은닉하기 위해서는 네트워크 전반에 걸쳐 수많은 속임수용 더미 패킷들이 발행되어야한다. 이 논문에서는 모바일 싱크(기지국)와 근원지들을 포함하는 일정 크기의 원 형태 내에 존재하는 노드들로 국한되는 플러딩 기반의 데이터 전송 프로토콜을 제안하여 노드들의 위치 기밀을 유지하고 생성되는 더미 패킷들의 수를 감축하고자 한다. 플러딩 크기는 보안 수준과 통신 비용을 고려하여 결정할 수 있다. 제안 프로토콜을 설계하고 주요 특성을 검증한다.

Keywords

References

  1. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of The 25th Int. Conf. on Distributed Computing Systems, Columbus, OH, Apr. 2005, pp. 1-10.
  2. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of 26th Annual IEEE Conf. on Computer Communications IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp. 1955-1963.
  3. K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320- 336. https://doi.org/10.1109/TMC.2011.32
  4. E. Ngai and I. Rodhe, "On providing location privacy for mobile sinks in wireless sensor networks," Wireless Networks, vol. 19, no. 1, 2013, pp. 115-130. https://doi.org/10.1007/s11276-012-0454-z
  5. C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.
  6. Y. Tscha, "Concealing communication source and destination in wireless sensor networks(Part I): Protocol Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 2, 2013, pp. 219-226. https://doi.org/10.13067/JKIECS.2013.8.2.219
  7. M.-Y. Son and Y.-H. Kim, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897. https://doi.org/10.13067/JKIECS.2014.9.8.889
  8. K. Kim, B. Kim, S. Bae, and D. Kim "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.