Palmieri, P., 2016. Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks. In: Information and Communications Security 17th International Conference (ICICS 2015), 9 - 11 December 2015, Beijing, China, 436 - 444.
Full text available as:
|
PDF
Palmieri_ICICS2015.pdf - Accepted Version 219kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1007/978-3-319-29814-6_37
Abstract
Wireless Sensor Networks (WSN) are often deployed in hostile or difficult scenarios, such as military battlefields and disaster recovery, where it is crucial for the network to be highly fault tolerant, scalable and decentralized. For this reason, peer-to-peer primitives such as Distributed Hash Table (DHT), which can greatly enhance the scalability and resilience of a network, are increasingly being introduced in the design of WSN's. Securing the communication within the WSN is also imperative in hostile settings. In particular, context information, such as the network topology and the location and identity of base stations (which collect data gathered by the sensors and are a central point of failure) can be protected using traffic encryption and anonymous routing. In this paper, we propose a protocol achieving a modified version of onion routing over wireless sensor networks based on the DHT paradigm. The protocol prevents adversaries from learning the network topology using traffic analysis, and therefore preserves the context privacy of the network. Furthermore, the proposed scheme is designed to minimize the computational burden and power usage of the nodes, through a novel partitioning scheme and route selection algorithm.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 0302-9743 |
Additional Information: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 9543 pp. 436 - 444 |
Uncontrolled Keywords: | Wireless Sensor Networks; Context privacy; Anonymity; Onion routing; Distributed Hash Table |
Group: | Faculty of Science & Technology |
ID Code: | 23294 |
Deposited By: | Symplectic RT2 |
Deposited On: | 18 Mar 2016 15:03 |
Last Modified: | 14 Mar 2022 13:55 |
Downloads
Downloads per month over past year
Repository Staff Only - |