SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Enhancing Source-Location Privacy in
     Sensor Network Routing

    P. Kamat, Y. Zhang, W. Trappe and C. Ozturk
  Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems
                                Rutgers University


                           Matthew Sanderson




                                                                                  1
Presentation Outline
   Introduction to issue
   Panda vs Hunter
   Techniques for Stationary Sources
        Routing Protocols
       Performance Comparison
       Improvement for privacy.
   (Briefly) Mobile Sources
   Related/Future Work
   Conclusion
   Questions

                                        2
The issue is privacy.

   “Guarantee that information is observable or decipherable
    by only those who are intentionally meant to observe or
    decipher it.”

   Two broad categories:
      content-oriented
      context-oriented


                                                                3
Content-oriented Security/Privacy


   Security of the contents of
    messages.
   Cryptographic methods.




                                          4
Contextual Privacy

   Deals with context in
    which the sensor
    application works.
   In this case: location
   Not as thoroughly
    researched.
   What this paper covers.




                                      5
Source-location Privacy


   Privacy of the node sending the initial message.

   Two metrics:
      safety period – how long until the node is
      discovered
      capture likelihood – how likely it will get discovered


                                                               6
Accomplishing source-location privacy


   Look at popular routing techniques.
   Augment these techniques with a new approach.
   Energy consumption still important.




                                                    7
Panda-Hunter Game Model Scenario

   Panda-Hunter Game:
       A sensor network has been
       deployed to monitor a panda
       habitat.
       Sensors send Panda_Here
       messages
       Messages are forwarded to a data
       sink.
       The hunter observes packets and
       traces his way back to the panda.


   Privacy Goal: Increase the time
    needed for an adversary to track
    and capture the panda (safety           Data Sink
    period).
                                            Sensor Node



                      Slide source: Wenyuan Xu
                                                          8
Additional Game Setup Issues


   One panda – one source

   Additional Goal: deliver
    messages to base station.

   Concern: energy usage.
                                Data Sink

                                Sensor Node




                                              9
The Hunter
   Non-malicious – does not
    interfere with network
   Device-rich – has devices to
    measure angle of arriving
    message
   Resource-rich – move at any
    rate and unlimited power
   Informed – knows how the
    network works


                                    10
How the hunter gets each message.

   Two primary routing
    techniques.
      Flooding
      Single-path

   New approach: Phantom
    Routing.



                                         11
Routing Techniques - Flooding
   Flooding-based: source
    sends the message to all
    its neighbors, who in turn
    do the same.
   If node has received it
    already, the node discards
    it.
   Performance drawbacks,
    but easy implementation.


                                          12
Probabilistic Flooding
   Like flooding, but with a
    probability.
   When a node receives a
    message, it randomly
    generates a number
    uniformly distributed
    between 0 and 1.
   If # < forwarding
    probability, it sends,
    otherwise, it doesn't.


                                         13
Single-Path Routing


   Instead of sending out to all
    neighbors, single-path sends
    out to one or a small subset
    of neighbors.
   Usually require extra
    hardware or a pre-
    configuration phase.
                                    Data Sink

                                    Sensor Node




                                                  14
How well do they work?




                         15
Performance Comparison cont.




                               16
Privacy of Routing Techniques

   Problems with single-path and flooding
       Single-path reduces energy, but poor at protecting source-
       location privacy.
       Flooding isn't any better, because the shortest-path is still
       contained within the flood.
       Probabilistic flooding helps – higher safety period, but at the cost
       of delivery ratio.
   There is room for improvement.
       Maybe trick the hunter?



                                                                              17
Routing with Fake Sources

   Idea: inject fake messages
    to throw off hunter.
   Multiple ways this can be
    done.
      Short-lived – similar to
      probabilistic flooding.




                                       18
Persistent Fake Source
   Short-lived fake sources can only draw the hunter away
    momentarily.
   A persistent fake source is more effective, but requires a
    global overview of network.
   Source sends its hop count to sink – sink instigates a fake
    source at a node with the same hop count in the opposite
    direction.
   Works best when fake source sends at higher rate than
    real source, but requires large energy budget.


                                                                  19
Problem with Fake Sources: Perceptive Hunter



   Recall the assumptions on our hunter – he's informed.
   Once he realizes the fake source, he knows which
    direction to go for the real source.

   We need a new approach.




                                                            20
Phantom Routing
   Idea: entice hunter to
    phantom instead of
    source.
   Has two phases:
       Random walk phase
       Flood/Single-path
       phase




                                       21
Types of Random Walk

   Sector-based – requires
    knowledge of landmark
    nodes to send message
    away from source.
   Hop-based – requires
    knowledge of the hop
    count from each node to
    the base station.



                                     22
Phantom Routing Performance
   Can significantly improve
    the safety period.
   Higher the hopcount,
    higher the safety period.
   Also increases latency
    (Random walk of 20: 30%
    increase = 4x privacy).




                                         23
Possible Counter: Cautious Hunter

   Since the phantom routing may leave the hunter stranded,
    after some time, the cautious hunter may go back.

   No benefit – no progress made by hunter.
   Better to be patient.




                                                               24
Mobile Source
   Need to rethink entire
    process again.

   Depends on panda's
    movement pattern and
    velocity.




                                      25
Panda Velocity

   More profound on single-path routing, as subsequent
    route may have little overlap compared to flooding.

   Panda's speed with single-path is protection enough.

   Improves privacy of phantom routing.




                                                           26
Hunter's Range

Not so surprising, if the
 hunter's hearing range is
 increased, the hunter is
 more effective.




                                   27
Related/Future Material

   Entrapping Adversaries for Source Protection in Sensor Networks
       Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon – Dartmouth College

   Preserving Source Location Privacy in Monitoring-based Wireless Sensor
    Networks
       Yong Xi, Loren Schwiebert, Weisong Shi – Wayne State University

   Location Privacy in Sensor Networks Against a Global Eavesdropper
       Kiran Mehta, Donggang Liu, Matthew Wright – University of Texas at Arlington




                                                                                              28
Conclusion

   The panda-hunter game is somewhat contrived.
      Does a great job at visualizing concept.
   Concept is simple and effective.
   Source-location privacy for sensor networks seems to be
    a minor issue.
      I'm willing to admit I'm wrong here.
      Come up with some examples.




                                                              29
Questions?



   ?

             30

Weitere ähnliche Inhalte

Was ist angesagt?

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd Iaetsd
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIJERA Editor
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioralIJNSA Journal
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 

Was ist angesagt? (17)

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
N0704075079
N0704075079N0704075079
N0704075079
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
01438360
0143836001438360
01438360
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Bi24385389
Bi24385389Bi24385389
Bi24385389
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioral
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 

Andere mochten auch

Visual Storytelling Part 1: PLOT Your Presentation
Visual Storytelling Part 1: PLOT Your PresentationVisual Storytelling Part 1: PLOT Your Presentation
Visual Storytelling Part 1: PLOT Your PresentationIvan Ruiz
 
Working Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInWorking Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInRajan Chhangani
 
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...Case estágio - Proposta de interface para um módulo de estratégia do sistema ...
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...Guilherme Ponce
 
Internal Social and Collaboration presented at 18F
Internal Social and Collaboration presented at 18FInternal Social and Collaboration presented at 18F
Internal Social and Collaboration presented at 18FThomas Vander Wal
 
Open Budget Data: A Landscape Analysis
Open Budget Data: A Landscape AnalysisOpen Budget Data: A Landscape Analysis
Open Budget Data: A Landscape AnalysisJonathan Gray
 
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...Skolkovo Robotics Center
 
Acceso electrónico a los servicios públicos.
Acceso electrónico a los servicios públicos.Acceso electrónico a los servicios públicos.
Acceso electrónico a los servicios públicos.José María
 
Изучение планет Солнечной системы
Изучение планет Солнечной системыИзучение планет Солнечной системы
Изучение планет Солнечной системыredy
 
Marketing with Digital Tools
Marketing with Digital ToolsMarketing with Digital Tools
Marketing with Digital Toolscoursestorm
 
Прямые продажи облачных сервисов
Прямые продажи облачных сервисовПрямые продажи облачных сервисов
Прямые продажи облачных сервисовSaaS.ru Portal
 
Tableau - ANAND CHOKHI DEMO - Filled Map Chart
Tableau - ANAND CHOKHI DEMO - Filled Map ChartTableau - ANAND CHOKHI DEMO - Filled Map Chart
Tableau - ANAND CHOKHI DEMO - Filled Map ChartAnand Chokshi
 

Andere mochten auch (15)

Visual Storytelling Part 1: PLOT Your Presentation
Visual Storytelling Part 1: PLOT Your PresentationVisual Storytelling Part 1: PLOT Your Presentation
Visual Storytelling Part 1: PLOT Your Presentation
 
Working Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInWorking Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedIn
 
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...Case estágio - Proposta de interface para um módulo de estratégia do sistema ...
Case estágio - Proposta de interface para um módulo de estratégia do sistema ...
 
Patrones de medición
Patrones de mediciónPatrones de medición
Patrones de medición
 
Internal Social and Collaboration presented at 18F
Internal Social and Collaboration presented at 18FInternal Social and Collaboration presented at 18F
Internal Social and Collaboration presented at 18F
 
Open Budget Data: A Landscape Analysis
Open Budget Data: A Landscape AnalysisOpen Budget Data: A Landscape Analysis
Open Budget Data: A Landscape Analysis
 
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...
Как думать о коммерциализации Искусственного Интеллекта и не разочароваться з...
 
Acceso electrónico a los servicios públicos.
Acceso electrónico a los servicios públicos.Acceso electrónico a los servicios públicos.
Acceso electrónico a los servicios públicos.
 
Daily Newsletter: 19th July, 2011
Daily Newsletter: 19th July, 2011Daily Newsletter: 19th July, 2011
Daily Newsletter: 19th July, 2011
 
Изучение планет Солнечной системы
Изучение планет Солнечной системыИзучение планет Солнечной системы
Изучение планет Солнечной системы
 
Marketing with Digital Tools
Marketing with Digital ToolsMarketing with Digital Tools
Marketing with Digital Tools
 
scan
scanscan
scan
 
Ref
RefRef
Ref
 
Прямые продажи облачных сервисов
Прямые продажи облачных сервисовПрямые продажи облачных сервисов
Прямые продажи облачных сервисов
 
Tableau - ANAND CHOKHI DEMO - Filled Map Chart
Tableau - ANAND CHOKHI DEMO - Filled Map ChartTableau - ANAND CHOKHI DEMO - Filled Map Chart
Tableau - ANAND CHOKHI DEMO - Filled Map Chart
 

Ähnlich wie Panda lacotion

Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
A cloud based scheme for protecting
A cloud based scheme for protectingA cloud based scheme for protecting
A cloud based scheme for protectingIMPULSE_TECHNOLOGY
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNIJTET Journal
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A SurveyDetection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A Surveydbpublications
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 

Ähnlich wie Panda lacotion (20)

Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
A cloud based scheme for protecting
A cloud based scheme for protectingA cloud based scheme for protecting
A cloud based scheme for protecting
 
P017129296
P017129296P017129296
P017129296
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
best jewelry
best jewelrybest jewelry
best jewelry
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A SurveyDetection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 

Panda lacotion

  • 1. Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems Rutgers University Matthew Sanderson 1
  • 2. Presentation Outline  Introduction to issue  Panda vs Hunter  Techniques for Stationary Sources Routing Protocols Performance Comparison Improvement for privacy.  (Briefly) Mobile Sources  Related/Future Work  Conclusion  Questions 2
  • 3. The issue is privacy.  “Guarantee that information is observable or decipherable by only those who are intentionally meant to observe or decipher it.”  Two broad categories: content-oriented context-oriented 3
  • 4. Content-oriented Security/Privacy  Security of the contents of messages.  Cryptographic methods. 4
  • 5. Contextual Privacy  Deals with context in which the sensor application works.  In this case: location  Not as thoroughly researched.  What this paper covers. 5
  • 6. Source-location Privacy  Privacy of the node sending the initial message.  Two metrics: safety period – how long until the node is discovered capture likelihood – how likely it will get discovered 6
  • 7. Accomplishing source-location privacy  Look at popular routing techniques.  Augment these techniques with a new approach.  Energy consumption still important. 7
  • 8. Panda-Hunter Game Model Scenario  Panda-Hunter Game: A sensor network has been deployed to monitor a panda habitat. Sensors send Panda_Here messages Messages are forwarded to a data sink. The hunter observes packets and traces his way back to the panda.  Privacy Goal: Increase the time needed for an adversary to track and capture the panda (safety Data Sink period). Sensor Node Slide source: Wenyuan Xu 8
  • 9. Additional Game Setup Issues  One panda – one source  Additional Goal: deliver messages to base station.  Concern: energy usage. Data Sink Sensor Node 9
  • 10. The Hunter  Non-malicious – does not interfere with network  Device-rich – has devices to measure angle of arriving message  Resource-rich – move at any rate and unlimited power  Informed – knows how the network works 10
  • 11. How the hunter gets each message.  Two primary routing techniques. Flooding Single-path  New approach: Phantom Routing. 11
  • 12. Routing Techniques - Flooding  Flooding-based: source sends the message to all its neighbors, who in turn do the same.  If node has received it already, the node discards it.  Performance drawbacks, but easy implementation. 12
  • 13. Probabilistic Flooding  Like flooding, but with a probability.  When a node receives a message, it randomly generates a number uniformly distributed between 0 and 1.  If # < forwarding probability, it sends, otherwise, it doesn't. 13
  • 14. Single-Path Routing  Instead of sending out to all neighbors, single-path sends out to one or a small subset of neighbors.  Usually require extra hardware or a pre- configuration phase. Data Sink Sensor Node 14
  • 15. How well do they work? 15
  • 17. Privacy of Routing Techniques  Problems with single-path and flooding Single-path reduces energy, but poor at protecting source- location privacy. Flooding isn't any better, because the shortest-path is still contained within the flood. Probabilistic flooding helps – higher safety period, but at the cost of delivery ratio.  There is room for improvement. Maybe trick the hunter? 17
  • 18. Routing with Fake Sources  Idea: inject fake messages to throw off hunter.  Multiple ways this can be done. Short-lived – similar to probabilistic flooding. 18
  • 19. Persistent Fake Source  Short-lived fake sources can only draw the hunter away momentarily.  A persistent fake source is more effective, but requires a global overview of network.  Source sends its hop count to sink – sink instigates a fake source at a node with the same hop count in the opposite direction.  Works best when fake source sends at higher rate than real source, but requires large energy budget. 19
  • 20. Problem with Fake Sources: Perceptive Hunter  Recall the assumptions on our hunter – he's informed.  Once he realizes the fake source, he knows which direction to go for the real source.  We need a new approach. 20
  • 21. Phantom Routing  Idea: entice hunter to phantom instead of source.  Has two phases: Random walk phase Flood/Single-path phase 21
  • 22. Types of Random Walk  Sector-based – requires knowledge of landmark nodes to send message away from source.  Hop-based – requires knowledge of the hop count from each node to the base station. 22
  • 23. Phantom Routing Performance  Can significantly improve the safety period.  Higher the hopcount, higher the safety period.  Also increases latency (Random walk of 20: 30% increase = 4x privacy). 23
  • 24. Possible Counter: Cautious Hunter  Since the phantom routing may leave the hunter stranded, after some time, the cautious hunter may go back.  No benefit – no progress made by hunter.  Better to be patient. 24
  • 25. Mobile Source  Need to rethink entire process again.  Depends on panda's movement pattern and velocity. 25
  • 26. Panda Velocity  More profound on single-path routing, as subsequent route may have little overlap compared to flooding.  Panda's speed with single-path is protection enough.  Improves privacy of phantom routing. 26
  • 27. Hunter's Range Not so surprising, if the hunter's hearing range is increased, the hunter is more effective. 27
  • 28. Related/Future Material  Entrapping Adversaries for Source Protection in Sensor Networks Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon – Dartmouth College  Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks Yong Xi, Loren Schwiebert, Weisong Shi – Wayne State University  Location Privacy in Sensor Networks Against a Global Eavesdropper Kiran Mehta, Donggang Liu, Matthew Wright – University of Texas at Arlington 28
  • 29. Conclusion  The panda-hunter game is somewhat contrived. Does a great job at visualizing concept.  Concept is simple and effective.  Source-location privacy for sensor networks seems to be a minor issue. I'm willing to admit I'm wrong here. Come up with some examples. 29
  • 30. Questions? ? 30