DOI QR코드

DOI QR Code

Generation of Dummy Messages Depending Upon the Location Privacy Level in Sensor Networks

센서 네트워크에서 위치 기밀 수준에 따른 더미 메시지 생성

  • 차영환 (상지대학교 컴퓨터정보공학부)
  • Received : 2016.08.29
  • Accepted : 2016.09.24
  • Published : 2016.09.30

Abstract

Dummy messages are usually generated for faking in preserving the location privacy of a sink or source against the global eavesdropping in wireless networks. In this paper, we propose a new method in which a certain number of nodes determined by considering the required privacy level are made to transit to the dormant state doing nothing so that the total number of dummy messages is reduced, while the paths from the sink to the sources are ensured. Through simulation we verify the success ratio of path establishments between the sink and a set of sources and the location privacy level of them.

센서 네트워크에서 광역 도청에 대응하여 기지국이나 근원지들의 위치 기밀을 유지하기 위해서는 일반적으로 더미 메시지들을 발행해야한다. 이 논문에서는 기지국과 근원지들 간에 통신 경로를 확보하는 한편, 요구되는 기밀 수준을 고려하여 일정 수의 노드들을 아무런 활동도 하지 않는 휴면 상태로 전환하도록 하여 전체 더미 메시지들의 발생을 줄이는 방법을 제안한다. 시뮬레이션을 통해 기지국과 근원지들 간의 경로 설정 성공률과 그들의 위치 기밀 수준을 검증한다.

Keywords

References

  1. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of Int. Conf. on Distributed Computing System 2005, Columbus, Ohio, USA, June 6-9, 2005, pp.1-10.
  2. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," In Proc. of IEEE (INFOCOM) Int. Conf. on Computer Communications 2007, Anchorage, Alaska, USA, May 6-12, 2007, pp. 1955-1963.
  3. K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320-336. https://doi.org/10.1109/TMC.2011.32
  4. Y. Tscha, "Concealing communication paths in wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 1, 2014, pp. 115-130.
  5. Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, and Fillia Makedon, "Source location privacy against laptop-class attacks in sensor networks," In Proc. of ACM 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22-25, 2008, pp. 5-14.
  6. M. Yon and Y. Him, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897. https://doi.org/10.13067/JKIECS.2014.9.8.889
  7. K. Kim, B. Kim, S. Bae, and D. Kim, "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
  8. C. See, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804.