Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks

Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks Sensor Node Source Privacy and Packet Recovery Under Eavesdropping and Node Compromise Attacks KANTHAKUMAR PONGALIUR and LI XIAO, Michigan State University Securing a sensor network poses a variety of problems. Of those, an important one is of providing privacy to the event-detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can inadvertently leak event location. Safeguarding the privacy of the source node is important, as sensor networks hold critical roles in military application, tracking endangered species, etc. Existing techniques in sensor networks use either random walk path or generate fake event packets to make it hard for an adversary to trace back to the source, since encryption alone may not help prevent a traffic analysis attack. In this work, without using traditional overhead-intensive methods, we present a scheme for hiding source information using cryptographic techniques incurring lower overhead. The packet is modified en route by dynamically selected nodes to make it difficult for a malicious entity to trace back the packet to a source node and also to prevent packet spoofing. This is important because the adversary model considers a super-local eavesdropper having the ability to compromise sensor nodes. Additionally, we provide http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Transactions on Sensor Networks (TOSN) Association for Computing Machinery

Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks

Loading next page...
 
/lp/association-for-computing-machinery/sensor-node-source-privacy-and-packet-recovery-under-eavesdropping-and-loCfWk6xKP
Publisher
Association for Computing Machinery
Copyright
Copyright © 2013 by ACM Inc.
ISSN
1550-4859
DOI
10.1145/2489253.2489267
Publisher site
See Article on Publisher Site

Abstract

Sensor Node Source Privacy and Packet Recovery Under Eavesdropping and Node Compromise Attacks KANTHAKUMAR PONGALIUR and LI XIAO, Michigan State University Securing a sensor network poses a variety of problems. Of those, an important one is of providing privacy to the event-detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can inadvertently leak event location. Safeguarding the privacy of the source node is important, as sensor networks hold critical roles in military application, tracking endangered species, etc. Existing techniques in sensor networks use either random walk path or generate fake event packets to make it hard for an adversary to trace back to the source, since encryption alone may not help prevent a traffic analysis attack. In this work, without using traditional overhead-intensive methods, we present a scheme for hiding source information using cryptographic techniques incurring lower overhead. The packet is modified en route by dynamically selected nodes to make it difficult for a malicious entity to trace back the packet to a source node and also to prevent packet spoofing. This is important because the adversary model considers a super-local eavesdropper having the ability to compromise sensor nodes. Additionally, we provide

Journal

ACM Transactions on Sensor Networks (TOSN)Association for Computing Machinery

Published: Jul 1, 2013

There are no references for this article.