Perfect contextual information privacy in WSNs under colluding eavesdroppers

Alejandro Proaño, Loukas Lazos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

We address the problem of preserving contextual information privacy in wireless sensor networks (WSNs). We consider an adversarial network of colluding eavesdroppers that are placed at unknown locations. Eavesdroppers use communication attributes of interest such as packet sizes, interpacket timings, and unencrypted headers to infer contextual information, including the time and location of events reported by sensors, the sink's position, and the event type. We propose a traffic normalization technique that employs a minimum backbone set of sensors to decorrelate the observable traffic patterns from the real ones. Compared to previous works, our method significantly reduces the communication overhead for normalizing traffic patterns.

Original languageEnglish (US)
Title of host publicationWiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Pages89-94
Number of pages6
DOIs
StatePublished - 2013
Event6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013 - Budapest, Hungary
Duration: Apr 17 2013Apr 19 2013

Other

Other6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013
CountryHungary
CityBudapest
Period4/17/134/19/13

Fingerprint

Wireless sensor networks
Communication
Sensors

Keywords

  • Algorithms
  • Colluding adversaries
  • Eavesdropping
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Proaño, A., & Lazos, L. (2013). Perfect contextual information privacy in WSNs under colluding eavesdroppers. In WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 89-94) https://doi.org/10.1145/2462096.2462112

Perfect contextual information privacy in WSNs under colluding eavesdroppers. / Proaño, Alejandro; Lazos, Loukas.

WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 2013. p. 89-94.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Proaño, A & Lazos, L 2013, Perfect contextual information privacy in WSNs under colluding eavesdroppers. in WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. pp. 89-94, 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, Budapest, Hungary, 4/17/13. https://doi.org/10.1145/2462096.2462112
Proaño A, Lazos L. Perfect contextual information privacy in WSNs under colluding eavesdroppers. In WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 2013. p. 89-94 https://doi.org/10.1145/2462096.2462112
Proaño, Alejandro ; Lazos, Loukas. / Perfect contextual information privacy in WSNs under colluding eavesdroppers. WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 2013. pp. 89-94
@inproceedings{590f7673649d4344813a1a51572b8169,
title = "Perfect contextual information privacy in WSNs under colluding eavesdroppers",
abstract = "We address the problem of preserving contextual information privacy in wireless sensor networks (WSNs). We consider an adversarial network of colluding eavesdroppers that are placed at unknown locations. Eavesdroppers use communication attributes of interest such as packet sizes, interpacket timings, and unencrypted headers to infer contextual information, including the time and location of events reported by sensors, the sink's position, and the event type. We propose a traffic normalization technique that employs a minimum backbone set of sensors to decorrelate the observable traffic patterns from the real ones. Compared to previous works, our method significantly reduces the communication overhead for normalizing traffic patterns.",
keywords = "Algorithms, Colluding adversaries, Eavesdropping, Security, Wireless sensor networks",
author = "Alejandro Proa{\~n}o and Loukas Lazos",
year = "2013",
doi = "10.1145/2462096.2462112",
language = "English (US)",
isbn = "9781450319980",
pages = "89--94",
booktitle = "WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks",

}

TY - GEN

T1 - Perfect contextual information privacy in WSNs under colluding eavesdroppers

AU - Proaño, Alejandro

AU - Lazos, Loukas

PY - 2013

Y1 - 2013

N2 - We address the problem of preserving contextual information privacy in wireless sensor networks (WSNs). We consider an adversarial network of colluding eavesdroppers that are placed at unknown locations. Eavesdroppers use communication attributes of interest such as packet sizes, interpacket timings, and unencrypted headers to infer contextual information, including the time and location of events reported by sensors, the sink's position, and the event type. We propose a traffic normalization technique that employs a minimum backbone set of sensors to decorrelate the observable traffic patterns from the real ones. Compared to previous works, our method significantly reduces the communication overhead for normalizing traffic patterns.

AB - We address the problem of preserving contextual information privacy in wireless sensor networks (WSNs). We consider an adversarial network of colluding eavesdroppers that are placed at unknown locations. Eavesdroppers use communication attributes of interest such as packet sizes, interpacket timings, and unencrypted headers to infer contextual information, including the time and location of events reported by sensors, the sink's position, and the event type. We propose a traffic normalization technique that employs a minimum backbone set of sensors to decorrelate the observable traffic patterns from the real ones. Compared to previous works, our method significantly reduces the communication overhead for normalizing traffic patterns.

KW - Algorithms

KW - Colluding adversaries

KW - Eavesdropping

KW - Security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=84879508363&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84879508363&partnerID=8YFLogxK

U2 - 10.1145/2462096.2462112

DO - 10.1145/2462096.2462112

M3 - Conference contribution

SN - 9781450319980

SP - 89

EP - 94

BT - WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks

ER -