Muutke küpsiste eelistusi

E-raamat: Location Privacy in Wireless Sensor Networks

(University of Malaga, Computer Science Department, NCIS Lab, Spain), (University of Malaga, Spain), (Siemens AG, Munich, Germany)
  • Formaat - PDF+DRM
  • Hind: 58,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.

Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.
1 Introduction
1(24)
1.1 Wireless Sensor Networks
2(4)
1.2 Overview of Security in Wireless Sensor Networks
6(3)
1.3 Privacy in Wireless Sensor Networks
9(7)
1.3.1 User-Centric Privacy
10(2)
1.3.2 Network-Centric Privacy
12(1)
1.3.2.1 Content-Oriented Privacy
12(3)
1.3.2.2 Context-Oriented Privacy
15(1)
1.4 Location Privacy in Wireless Sensor Networks
16(6)
1.4.1 Motivating Scenario
17(1)
1.4.2 Source-Location Privacy
18(2)
1.4.3 Receiver-Location Privacy
20(2)
1.5 Book Outline
22(3)
2 Suitability of Computer-Based Anonymity Systems
25(28)
2.1 Anonymous Communications Systems
26(7)
2.1.1 Anonymity Terminology
27(2)
2.1.2 Anonymity Properties in Wireless Sensor Network
29(2)
2.1.3 Classification of Solutions
31(2)
2.2 Centralized Schemes
33(7)
2.2.1 Single-Proxy
33(2)
2.2.2 Mixes
35(3)
2.2.3 Onion Routing and Tor
38(2)
2.3 Decentralized Schemes
40(8)
2.3.1 Crowds and Hordes
41(2)
2.3.2 GNUnet Anonymity Protocol
43(2)
2.3.3 DC-nets and Herbivore
45(3)
2.4 Evaluation
48(5)
3 Analysis of Location Privacy Solutions in WSNs
53(46)
3.1 Node Identity Protection
54(5)
3.1.1 Pool of Pseudonyms
55(1)
3.1.2 Cryptographic Pseudonyms
56(3)
3.2 Source Protection
59(24)
3.2.1 Local Adversaries
59(1)
3.2.1.1 Undirected Random Paths
60(4)
3.2.1.2 Directed Random Paths
64(4)
3.2.1.3 Network Loop Methods
68(3)
3.2.1.4 Fake Data Sources
71(2)
3.2.2 Global Adversaries
73(1)
3.2.2.1 Dummy Traffic Injection
74(1)
3.2.2.2 Energy-Aware Approaches
75(5)
3.2.3 Internal Adversaries
80(3)
3.3 Receiver Protection
83(13)
3.3.1 Local Adversaries
83(1)
3.3.1.1 Basic Countermeasures
84(1)
3.3.1.2 Biased Random "Walks
85(1)
3.3.1.3 Fake Traffic Injection
86(1)
3.3.1.4 Sink Simulation
87(2)
3.3.2 Global Adversaries
89(1)
3.3.2.1 Traffic Homogenization
90(2)
3.3.2.2 Sink Simulation
92(2)
3.3.2.3 Relocation and Disguise
94(2)
3.4 Summary
96(3)
4 Context-Aware Source-Location Privacy
99(24)
4.1 Problem Statement
100(2)
4.1.1 Network Model
100(1)
4.1.2 Threat Model
101(1)
4.2 Context-Aware Location Privacy
102(6)
4.2.1 Overview
102(1)
4.2.2 Software Integration
102(1)
4.2.3 Adversary Detection
103(2)
4.2.4 Route Updating Process
105(1)
4.2.5 Data Forwarding Process
106(2)
4.3 Shortest-Path CALP Routing
108(4)
4.3.1 Shortest-Path Routing
108(1)
4.3.2 Combination with CALP
109(3)
4.4 Protocol Evaluation
112(9)
4.4.1 Simulation Scenario
112(1)
4.4.2 Privacy Protection Level
113(2)
4.4.3 Protocol Overhead
115(3)
4.4.4 Safety Distance Impact
118(3)
4.5 Summary and Improvements
121(2)
5 Probabilistic Receiver-Location Privacy
123(32)
5.1 Problem Statement
124(4)
5.1.1 Network Model
124(1)
5.1.2 Threat Model
125(1)
5.1.2.1 Traffic Analysis Attacks
125(2)
5.1.2.2 Routing Tables Inspection
127(1)
5.2 Homogeneous Injection for Sink Privacy
128(6)
5.2.1 Overview
128(2)
5.2.2 Routing Tables Creation
130(1)
5.2.3 Desired Properties
131(1)
5.2.4 Transmission Protocol
132(2)
5.3 Node Compromise Protection
134(8)
5.3.1 Overview
134(1)
5.3.2 Basic Countermeasures
134(1)
5.3.3 Perturbation Requirements
135(4)
5.3.4 Perturbation Algorithm
139(3)
5.4 Protocol Evaluation
142(11)
5.4.1 Network Topology
142(3)
5.4.2 Message Delivery Time
145(3)
5.4.3 Fake Traffic Overhead
148(1)
5.4.4 Privacy Protection
149(4)
5.5 Summary and Improvements
153(2)
6 Conclusion
155(10)
6.1 Summary
155(2)
6.2 Future Challenges
157(8)
6.2.1 Cost-Effective Location Privacy Solutions
158(1)
6.2.2 Complete Privacy Solutions
158(1)
6.2.3 Realistic Adversaries
159(1)
6.2.4 Interoperable Evaluation Framework
160(1)
6.2.5 Future Sensor Networks
161(4)
References 165(12)
Index 177
Ruben Rios is a post-doc researcher at the NICS Lab, which is part of the Computer Science Department at the University of Malaga, in Spain. He holds a Cum Laude Ph.D. in Computer Science from the same university, where he also obtained the MS in Computer Engineering. Before that, he studied at the University of Skövde in Sweden, where he obtained a BSc in Computer Science. He has been involved in the scientific committee of numerous conferences and served as a reviewer for multiple journals. Recently he joined the Editorial Board of the International Journal Of Computer and Software Engineering. He also has published a number of papers in top security-related conferences and journals with impact factor. He has been actively involved in several national and EU funded projects. His research interests cover various fields related to information security, being particularly interested in enabling privacy in resource-constrained devices, like smartphones, sensor networks, and the Internet of Things.



Javier Lopez is Full Professor at the University of Malaga. His research activities are mainly focused on network security, security protocols and critical information infrastructures, leading a number of national and international research projects in those areas, including projects in FP5, FP6 and FP7 European Programmes. Prof. Lopez is the Spanish representative in the IFIP Technical Committee 11 on Security and Protection in Information Systems, Co-Editor in Chief of International Journal of Information Security (IJIS), and a member of the Editorial Boards of, amongst others, IEEE Wireless Communications, Computers & Security, IEEE Internet of Things Journal, Journal of Computer Security, IET Information Security, and International Journal on Critical Infrastructure Protection. In the past, he has been Chair of the IFIP Working Group 11.11 on Trust Management and Chair of the ERCIM Working Group on Security and Trust Management.



Jorge Cuellar is a principal consultant at Siemens AG. He was awarded the DI-ST Award for the best technical achievement for his work on modelling of operating systems and transaction managers. He has co-authored about 30 papers on different topics, including formal specification and verification of distributed system design, and security. He has done technical standardization work, related to the development of privacy and security protocols at the IETF, 3GPP, and the Open Mobile Alliance. He has 16 inventions and patents. He has worked in several EU funded research projects, in particular in AVISPA and AVANTSSAR, both related to the formal modelling and verification of security and currently in NESSoS, WebSand, and SPACIoS. He has served as the PC Co-chair of Software Engineering and Formal Methods (SEFM) in 2004, Formal Methods (FM 08) in 2008, and STM 10 and in the steering committee of ESSoS. He has presented more than 20 invited talks at conferences and seminars, and acts regularly as a reviewer for international conferences and journals. He has been in the editorial board of Journal of Science of Computer ProgrammingElsevier. He is a member of the Industrial Curatory Board of Dagstuhl, Leibniz Center for Informatics, the worlds premier venue for informatics.