TY - GEN
T1 - The quality of source location protection in globally attacked sensor networks
AU - Kokalj-Filipovic, Silvija
AU - Le Fessant, Fabrice
AU - Spasojevic, Predrag
PY - 2011
Y1 - 2011
N2 - We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides statistical source anonymity is achieved by partitioning network nodes randomly into several node groups. Members of the same group collectively emulate both temporal and spatial distribution of the event. Under such dummy-traffic framework of the source anonymity protection, we aim to better model the global eavesdropper, especially her way of using statistical tests to detect the real event, and to present the quality of the location protection as relative to the adversary's strength. In addition, our approach aims to reduce the per-event work spent to generate the fake traffic while, most importantly, providing a guaranteed latency in reporting the event. The latency is controlled by decoupling the routing from the fake-traffic schedule. We believe that the proposed source anonymity protection strategy, and the quality evaluation framework, are well justified by the abundance of the applications that monitor a rare event with known temporal and uniform spatial statistics.
AB - We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides statistical source anonymity is achieved by partitioning network nodes randomly into several node groups. Members of the same group collectively emulate both temporal and spatial distribution of the event. Under such dummy-traffic framework of the source anonymity protection, we aim to better model the global eavesdropper, especially her way of using statistical tests to detect the real event, and to present the quality of the location protection as relative to the adversary's strength. In addition, our approach aims to reduce the per-event work spent to generate the fake traffic while, most importantly, providing a guaranteed latency in reporting the event. The latency is controlled by decoupling the routing from the fake-traffic schedule. We believe that the proposed source anonymity protection strategy, and the quality evaluation framework, are well justified by the abundance of the applications that monitor a rare event with known temporal and uniform spatial statistics.
UR - http://www.scopus.com/inward/record.url?scp=79958061942&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79958061942&partnerID=8YFLogxK
U2 - 10.1109/PERCOMW.2011.5766931
DO - 10.1109/PERCOMW.2011.5766931
M3 - Conference contribution
AN - SCOPUS:79958061942
SN - 9781612849379
T3 - 2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011
SP - 44
EP - 49
BT - 2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011
T2 - 2011 9th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011
Y2 - 21 March 2011 through 25 March 2011
ER -