|
|
1 | (24) |
|
1.1 Wireless Sensor Networks |
|
|
2 | (4) |
|
1.2 Overview of Security in Wireless Sensor Networks |
|
|
6 | (3) |
|
1.3 Privacy in Wireless Sensor Networks |
|
|
9 | (7) |
|
1.3.1 User-Centric Privacy |
|
|
10 | (2) |
|
1.3.2 Network-Centric Privacy |
|
|
12 | (1) |
|
1.3.2.1 Content-Oriented Privacy |
|
|
12 | (3) |
|
1.3.2.2 Context-Oriented Privacy |
|
|
15 | (1) |
|
1.4 Location Privacy in Wireless Sensor Networks |
|
|
16 | (6) |
|
1.4.1 Motivating Scenario |
|
|
17 | (1) |
|
1.4.2 Source-Location Privacy |
|
|
18 | (2) |
|
1.4.3 Receiver-Location Privacy |
|
|
20 | (2) |
|
|
22 | (3) |
|
2 Suitability of Computer-Based Anonymity Systems |
|
|
25 | (28) |
|
2.1 Anonymous Communications Systems |
|
|
26 | (7) |
|
2.1.1 Anonymity Terminology |
|
|
27 | (2) |
|
2.1.2 Anonymity Properties in Wireless Sensor Network |
|
|
29 | (2) |
|
2.1.3 Classification of Solutions |
|
|
31 | (2) |
|
|
33 | (7) |
|
|
33 | (2) |
|
|
35 | (3) |
|
2.2.3 Onion Routing and Tor |
|
|
38 | (2) |
|
2.3 Decentralized Schemes |
|
|
40 | (8) |
|
|
41 | (2) |
|
2.3.2 GNUnet Anonymity Protocol |
|
|
43 | (2) |
|
2.3.3 DC-nets and Herbivore |
|
|
45 | (3) |
|
|
48 | (5) |
|
3 Analysis of Location Privacy Solutions in WSNs |
|
|
53 | (46) |
|
3.1 Node Identity Protection |
|
|
54 | (5) |
|
|
55 | (1) |
|
3.1.2 Cryptographic Pseudonyms |
|
|
56 | (3) |
|
|
59 | (24) |
|
|
59 | (1) |
|
3.2.1.1 Undirected Random Paths |
|
|
60 | (4) |
|
3.2.1.2 Directed Random Paths |
|
|
64 | (4) |
|
3.2.1.3 Network Loop Methods |
|
|
68 | (3) |
|
3.2.1.4 Fake Data Sources |
|
|
71 | (2) |
|
|
73 | (1) |
|
3.2.2.1 Dummy Traffic Injection |
|
|
74 | (1) |
|
3.2.2.2 Energy-Aware Approaches |
|
|
75 | (5) |
|
3.2.3 Internal Adversaries |
|
|
80 | (3) |
|
|
83 | (13) |
|
|
83 | (1) |
|
3.3.1.1 Basic Countermeasures |
|
|
84 | (1) |
|
3.3.1.2 Biased Random "Walks |
|
|
85 | (1) |
|
3.3.1.3 Fake Traffic Injection |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
3.3.2.1 Traffic Homogenization |
|
|
90 | (2) |
|
|
92 | (2) |
|
3.3.2.3 Relocation and Disguise |
|
|
94 | (2) |
|
|
96 | (3) |
|
4 Context-Aware Source-Location Privacy |
|
|
99 | (24) |
|
|
100 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
4.2 Context-Aware Location Privacy |
|
|
102 | (6) |
|
|
102 | (1) |
|
4.2.2 Software Integration |
|
|
102 | (1) |
|
4.2.3 Adversary Detection |
|
|
103 | (2) |
|
4.2.4 Route Updating Process |
|
|
105 | (1) |
|
4.2.5 Data Forwarding Process |
|
|
106 | (2) |
|
4.3 Shortest-Path CALP Routing |
|
|
108 | (4) |
|
4.3.1 Shortest-Path Routing |
|
|
108 | (1) |
|
4.3.2 Combination with CALP |
|
|
109 | (3) |
|
|
112 | (9) |
|
4.4.1 Simulation Scenario |
|
|
112 | (1) |
|
4.4.2 Privacy Protection Level |
|
|
113 | (2) |
|
|
115 | (3) |
|
4.4.4 Safety Distance Impact |
|
|
118 | (3) |
|
4.5 Summary and Improvements |
|
|
121 | (2) |
|
5 Probabilistic Receiver-Location Privacy |
|
|
123 | (32) |
|
|
124 | (4) |
|
|
124 | (1) |
|
|
125 | (1) |
|
5.1.2.1 Traffic Analysis Attacks |
|
|
125 | (2) |
|
5.1.2.2 Routing Tables Inspection |
|
|
127 | (1) |
|
5.2 Homogeneous Injection for Sink Privacy |
|
|
128 | (6) |
|
|
128 | (2) |
|
5.2.2 Routing Tables Creation |
|
|
130 | (1) |
|
|
131 | (1) |
|
5.2.4 Transmission Protocol |
|
|
132 | (2) |
|
5.3 Node Compromise Protection |
|
|
134 | (8) |
|
|
134 | (1) |
|
5.3.2 Basic Countermeasures |
|
|
134 | (1) |
|
5.3.3 Perturbation Requirements |
|
|
135 | (4) |
|
5.3.4 Perturbation Algorithm |
|
|
139 | (3) |
|
|
142 | (11) |
|
|
142 | (3) |
|
5.4.2 Message Delivery Time |
|
|
145 | (3) |
|
5.4.3 Fake Traffic Overhead |
|
|
148 | (1) |
|
|
149 | (4) |
|
5.5 Summary and Improvements |
|
|
153 | (2) |
|
|
155 | (10) |
|
|
155 | (2) |
|
|
157 | (8) |
|
6.2.1 Cost-Effective Location Privacy Solutions |
|
|
158 | (1) |
|
6.2.2 Complete Privacy Solutions |
|
|
158 | (1) |
|
6.2.3 Realistic Adversaries |
|
|
159 | (1) |
|
6.2.4 Interoperable Evaluation Framework |
|
|
160 | (1) |
|
6.2.5 Future Sensor Networks |
|
|
161 | (4) |
References |
|
165 | (12) |
Index |
|
177 | |