We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Location Privacy against Traffic Analysis Attacks through Mobile Sinks using Trust Value Computing

by Nithya Joy, Biju Paul
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 13
Year of Publication: 2012
Authors: Nithya Joy, Biju Paul
10.5120/8104-1701

Nithya Joy, Biju Paul . Location Privacy against Traffic Analysis Attacks through Mobile Sinks using Trust Value Computing. International Journal of Computer Applications. 51, 13 ( August 2012), 34-37. DOI=10.5120/8104-1701

@article{ 10.5120/8104-1701,
author = { Nithya Joy, Biju Paul },
title = { Location Privacy against Traffic Analysis Attacks through Mobile Sinks using Trust Value Computing },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 13 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number13/8104-1701/ },
doi = { 10.5120/8104-1701 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:50:19.568932+05:30
%A Nithya Joy
%A Biju Paul
%T Location Privacy against Traffic Analysis Attacks through Mobile Sinks using Trust Value Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 13
%P 34-37
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We propose a method which provides location privacy against traffic analysis attacks. Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be described as the passive attacks that try to deduce the traffic pattern based on the eavesdropped information. They launch an active attack according to the achieved information about the nodes and synchronizing the cooperation of distributed components. Base station location privacy is the important term that is combined with two important concepts defined above . The proposed location privacy method is designed in order to remove the local adversary effect, sinkhole attack and Sybil attack. The network mix ring concept helps in local adversary effect while we have designed mobile sinks against sink hole attack. The Sybil attack is prevented by the trust value computing. In this paper we present our proposed technique with the small experimental setup that helps in further simulation of the technique.

References
  1. Raymond, J. F. ,"Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems" International Workshop on Designing Privacy-enhancing Technologies pp: 159-186, April 2006.
  2. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source location privacy in sensor network routing," Proc. of 25th (ICDCS), 2005.
  3. C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy constrained sensor network routing," Proc. of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
  4. Y. Jian, Shigang Chen, "Protecting Receiver-Location privacy in Wireless Sensor networks", IEEE INFOCOM 2007
  5. Yong Xi, L. Schwiebert, and Weisong Shi. "Preserving source location privacy in monitoring-based wireless sensor networks". In IEEE International Parallel and Distributed Processing Symposium, Los Alamitos,CA, USA, 2006. IEEE Computer Society
  6. Jing Deng Richard Han Shivakant Mishra, "Decorrelating Wireless Sensor Network Traffic To Inhibit Traffic Analysis Attacks" Elsevier Pervasive and Mobile Computing Journal, Special Issue on Security in Wireless Mobile Computing Systems, vol 2, issue 2, pp: 159-186, April 2006.
  7. Edith C. -H. Ngai. On providing sink anonymity for sensor networks. In IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pages 269-273, New York, NY, USA, 2009. ACM.
  8. R. Bettati, ``Modern Traffic Analysis and its Capabilities'', The NEXUS, Directorate of the Combined Arms Center (CAC) at Fort Leavenworth, Kansas, March 2009 Edition.
  9. J. Deng, R. Han, and S. Mishra. "'Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks" IEEE 2004 International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy, June 2004.
  10. Jing Deng, Richard Han, and Shivakant Mishra. " Countermeasures against track analysis attacks in wireless sensor networks" SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp:113-126, Washington, DC, USA, 2005
  11. Matthew Burnside and Angelos D. Keromytis. "Low latency anonymity with mix rings" Proceedings of the 9th International Information Security Conference (ISC), pp 32–45, June 2006.
  12. Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song, Heejo Lee, "Network Level Privacy for Wireless Sensor Networks", The Fourth International Conference on Information Assurance and Security, pp. 261-266, 2008
  13. Edith C. -H. Ngai , Ioana Rodhe, "On Providing Location Privacy for Mobile Sinks in Wireless Sensor Networks " Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems( MSWiM '09) ,pp: 1 - 6 , 2009
  14. R. Rios, and J. Lopez, "Analysis of Location Privacy Solutions in Wireless Sensor Networks", In IET Communications, vol. 5, issue 17, pp. 2518 – 2532, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Location Privacy Traffic Analysis Attacks Wireless sensor networks