Isolated Adversary Zone for source location privacy in Wireless Sensor Networks

Ali Nassiri, M. A. Razzaque, Abdul Hanan Abdullah

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

6 Citations (Scopus)

Abstract

Privacy, especially source location privacy in many Wireless Sensor Networks (WSNs) applications plays an important role in the effectiveness of these applications. Exposure of source location information in these applications may put the monitored entities or subjects in danger. Many solutions are available based on various techniques, including random walk. Most existing random walk based source location privacy preservation proposals may not work well in critical applications, because of their insufficient safety period, high energy consumption, and data delivery delay. This article proposes a novel solution for source location privacy in WSNs based on a random walk routing, especially for patient attackers to improve safety period and energy efficiency. The proposed strategy forms an Isolated Adversary Zone (IAZ) by sacrificing a certain percentage of sensor nodes and entraps patient attackers in that zone. This approach will increase safety period and energy efficiency in compared to the existing approaches as an entrapped patient attacker will wait for long time to make an attack.

Original languageEnglish
Title of host publication2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages108-113
Number of pages6
ISBN (Electronic)9781509003044
DOIs
Publication statusPublished - 26 Sep 2016
Event12th IEEE International Wireless Communications and Mobile Computing Conference - Paphos, Cyprus
Duration: 5 Sep 20169 Sep 2016
Conference number: 12

Publication series

Name2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016
ISSN (Electronic)2376-6506

Conference

Conference12th IEEE International Wireless Communications and Mobile Computing Conference
Abbreviated titleIWCMC 2016
CountryCyprus
CityPaphos
Period5/09/169/09/16

Fingerprint

Wireless sensor networks
Energy efficiency
Sensor nodes
Energy utilization

Cite this

Nassiri, A., Razzaque, M. A., & Abdullah, A. H. (2016). Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. In 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016 (pp. 108-113). [7577042] (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IWCMC.2016.7577042
Nassiri, Ali ; Razzaque, M. A. ; Abdullah, Abdul Hanan. / Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 108-113 (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).
@inproceedings{8047f819b74742698e4e3455f17a611b,
title = "Isolated Adversary Zone for source location privacy in Wireless Sensor Networks",
abstract = "Privacy, especially source location privacy in many Wireless Sensor Networks (WSNs) applications plays an important role in the effectiveness of these applications. Exposure of source location information in these applications may put the monitored entities or subjects in danger. Many solutions are available based on various techniques, including random walk. Most existing random walk based source location privacy preservation proposals may not work well in critical applications, because of their insufficient safety period, high energy consumption, and data delivery delay. This article proposes a novel solution for source location privacy in WSNs based on a random walk routing, especially for patient attackers to improve safety period and energy efficiency. The proposed strategy forms an Isolated Adversary Zone (IAZ) by sacrificing a certain percentage of sensor nodes and entraps patient attackers in that zone. This approach will increase safety period and energy efficiency in compared to the existing approaches as an entrapped patient attacker will wait for long time to make an attack.",
author = "Ali Nassiri and Razzaque, {M. A.} and Abdullah, {Abdul Hanan}",
year = "2016",
month = "9",
day = "26",
doi = "10.1109/IWCMC.2016.7577042",
language = "English",
series = "2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "108--113",
booktitle = "2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016",
address = "United States",

}

Nassiri, A, Razzaque, MA & Abdullah, AH 2016, Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. in 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016., 7577042, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016, Institute of Electrical and Electronics Engineers Inc., pp. 108-113, 12th IEEE International Wireless Communications and Mobile Computing Conference, Paphos, Cyprus, 5/09/16. https://doi.org/10.1109/IWCMC.2016.7577042

Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. / Nassiri, Ali; Razzaque, M. A.; Abdullah, Abdul Hanan.

2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 108-113 7577042 (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

TY - GEN

T1 - Isolated Adversary Zone for source location privacy in Wireless Sensor Networks

AU - Nassiri, Ali

AU - Razzaque, M. A.

AU - Abdullah, Abdul Hanan

PY - 2016/9/26

Y1 - 2016/9/26

N2 - Privacy, especially source location privacy in many Wireless Sensor Networks (WSNs) applications plays an important role in the effectiveness of these applications. Exposure of source location information in these applications may put the monitored entities or subjects in danger. Many solutions are available based on various techniques, including random walk. Most existing random walk based source location privacy preservation proposals may not work well in critical applications, because of their insufficient safety period, high energy consumption, and data delivery delay. This article proposes a novel solution for source location privacy in WSNs based on a random walk routing, especially for patient attackers to improve safety period and energy efficiency. The proposed strategy forms an Isolated Adversary Zone (IAZ) by sacrificing a certain percentage of sensor nodes and entraps patient attackers in that zone. This approach will increase safety period and energy efficiency in compared to the existing approaches as an entrapped patient attacker will wait for long time to make an attack.

AB - Privacy, especially source location privacy in many Wireless Sensor Networks (WSNs) applications plays an important role in the effectiveness of these applications. Exposure of source location information in these applications may put the monitored entities or subjects in danger. Many solutions are available based on various techniques, including random walk. Most existing random walk based source location privacy preservation proposals may not work well in critical applications, because of their insufficient safety period, high energy consumption, and data delivery delay. This article proposes a novel solution for source location privacy in WSNs based on a random walk routing, especially for patient attackers to improve safety period and energy efficiency. The proposed strategy forms an Isolated Adversary Zone (IAZ) by sacrificing a certain percentage of sensor nodes and entraps patient attackers in that zone. This approach will increase safety period and energy efficiency in compared to the existing approaches as an entrapped patient attacker will wait for long time to make an attack.

UR - http://www.scopus.com/inward/record.url?scp=84994164579&partnerID=8YFLogxK

U2 - 10.1109/IWCMC.2016.7577042

DO - 10.1109/IWCMC.2016.7577042

M3 - Conference contribution

T3 - 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

SP - 108

EP - 113

BT - 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Nassiri A, Razzaque MA, Abdullah AH. Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. In 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 108-113. 7577042. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016). https://doi.org/10.1109/IWCMC.2016.7577042