Sensors (Mar 2015)

Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

  • Abdel-Shakour Abuzneid,
  • Tarek Sobh,
  • Miad Faezipour,
  • Ausif Mahmood,
  • John James

DOI
https://doi.org/10.3390/s150305820
Journal volume & issue
Vol. 15, no. 3
pp. 5820 – 5864

Abstract

Read online

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

Keywords