能量受限传感器网络的源位置隐私

Celal Öztürk, Yanyong Zhang, W. Trappe, M. Ott
{"title":"能量受限传感器网络的源位置隐私","authors":"Celal Öztürk, Yanyong Zhang, W. Trappe, M. Ott","doi":"10.1109/WSTFEUS.2004.10012","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor's location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.","PeriodicalId":170872,"journal":{"name":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2004-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Source-location privacy for networks of energy-constrained sensors\",\"authors\":\"Celal Öztürk, Yanyong Zhang, W. Trappe, M. Ott\",\"doi\":\"10.1109/WSTFEUS.2004.10012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor's location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.\",\"PeriodicalId\":170872,\"journal\":{\"name\":\"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-05-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WSTFEUS.2004.10012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WSTFEUS.2004.10012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 50

摘要

无线传感器网络目前正在研究无处不在的计算应用。隐私是这些网络的一个关键问题,因为对手可能能够窃听或观察传感器数据的存在,以推断不打算透露的信息。构成传感器网络的设备是低功耗、计算受限的设备。任何隐私解决方案都应该仔细考虑支持位置隐私和能源消耗之间的权衡。我们探讨了两类主要的隐私问题:内容隐私和发信人位置隐私。可以通过提供数据机密性的传统加密方法来维护内容隐私。我们简要讨论了系统设计技术,这些技术可以防止攻击者从多个消息中关联观察结果来推断加密传感器读数的内容。然后,我们通过研究ad hoc网络的几种多跳路由机制来研究保护原始传感器位置的问题。我们将重点讨论三类路由协议:最短路径路由协议类、卸载协议类和混合路由类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Source-location privacy for networks of energy-constrained sensors
Wireless sensor networks are currently being investigated for ubiquitous computing applications. Privacy is a critical issue for these networks as adversaries may be able to eavesdrop or observe the presence of sensor data to infer information that was not intended to be revealed. The devices that constitute sensor networks are low-powered, compute-constrained devices. Any privacy solution should carefully consider the tradeoffs between supporting location-privacy and energy consumption. We explore two main classes of privacy issues: content privacy and originator location privacy. Content privacy can be maintained through conventional cryptographic methods that provide data confidentiality. We briefly discuss system design techniques that are needed to prevent an adversary from correlating observations from multiple messages to infer the content of encrypted sensor readings. We then examine the issue of protecting the originating sensor's location by studying several multihop routing mechanisms for ad hoc networks. We focus our discussion on three classes of routing protocols: the class of the shortest path routing protocols, the class offloading protocols, and a hybrid class of routing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信