A Security Measure That Quantify The Anonymity Of Different Systems

M Vamsi Krishna, Yalla Satyasudheer


The basis ambiguity difficulty in wireless sensor networks is the trouble of studying methods that provide time and position privacy for events reported by sensor nodes. Time and location privacy will be used interchangeably with source anonymity throughout the paper. The source anonymity problem has been drawing growing research concentration recently the source anonymity problem has been addressed under two different types of adversary’s namely local and global adversaries. A local adversary is definite to be an adversary having limited mobility and inequitable view of the network traffic. Routing based methods have been shown to be efficient in hiding the locations of reported events against local adversaries. A global adversary is defined to be an adversary with capacity to check the traffic of the entire network e.g. coordinating adversaries spatially distributed over the network. Against global adversaries routing based techniques are known to be unproductive in cover up location information in event-triggered transmission.


Wireless sensor networks (WSN), source location, privacy, anonymity, hypothesis testing, nuisance parameters, coding theory.


B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “On Source Anonymity in Wireless Sensor Networks,” Proc. IEEE/IFIP 40th Int’l Conf. Dependable Systems and Networks (DSN ’10), 2010.

B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “Statistical Framework for Source Anonymity in Sensor Networks,” Proc. IEEE GlobeCom, 2010.

I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.

T. Arampatzis, J. Lygeros, and S. Manesis, “A Survey of Applications of Wireless Sensors and Wireless Sensor Networks,” Proc. IEEE 13th Mediterranean Conf. Control and Automation (MED ’05), pp. 719-724, 2006.

J. Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Network Survey,” Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.

L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS ’02), pp. 41-47, 2002.

A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, “HIGHT: A New Block Cipher Suitable for Low-Resource Device,” Proc. Eighth Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES ’06), pp. 46-59, 2006.

A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra- Lightweight Block Cipher,” Proc. Ninth Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES ’07), pp. 450-466, 2007.

K. Mehta, D. Liu, and M. Wright, “Location Privacy in Sensor Networks against a Global Eavesdropper,” Proc. IEEE 15th Int’l Conf. Network Protocols (ICNP ’07), pp. 314-323, 2007.

M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towards Statistically Strong Source Anonymity for Sensor Networks,” Proc. IEEE INFOCOM, pp. 466-474, 2008.

P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proc. IEEE 25th Int’l Conf. Distributed Computing Systems (ICDCS ’05), pp. 599- 608, 2005.

C. Ozturk, Y. Zhang, and W. Trappe, “Source-Location Privacy in Energy-Constrained Sensor Network Routing,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 88- 93, 2004.

Y. Ouyang, Z. Le, G. Chen, J. Ford, F. Makedon, and U. Lowell, “Entrapping Adversaries for Source Protection in Sensor Networks,” Proc. IEEE Seventh Int’l Symp. World of Wireless, Mobile and Multimedia Networks (WOWMOM ’06), pp. 32-41, 2006.

X. Wang, X. Li, Z. Wan, and M. Gu, “CLEAR: A Confidential and Lifetime-Aware Routing Protocol for Wireless Sensor Network,” Proc. IEEE 20th Ann. Int’l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC ’09), pp. 2265-2269, 2009.

Y. Li and J. Ren, “Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 1-9, 2010.

Y. Xi, L. Schwiebert, and W. Shi, “Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks,” Proc. IEEE 20th Int’l Parallel & Distributed Processing Symp. (IPDPS ’06), pp. 1-8, 2006.

B. Hoh and M. Gruteser, “Protecting Location Privacy Through Path Confusion,” Proc. IEEE/CreatNet First Int’l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm ’05), pp. 194-205, 2005.

Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, “Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks,” Proc. First ACM Conf. Wireless Network Security (WiSec ’08), pp. 77-88, 2008.

N. Li, N. Zhang, S. Das, and B. Thuraisingham, “Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey,” Elsevier J. Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.



  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.