Back to Search Start Over

Preserving context privacy in distributed hash table wireless sensor networks

Authors :
Paolo Palmieri
Qing, Sihan
Okamoto, Eiji
Kwangjo, Kim
Liu, Dongmei
Qing, S.
Okamoto, E.
Kim, K.
Liu, D.
Source :
Information and Communications Security ISBN: 9783319298139, ICICS
Publication Year :
2015
Publisher :
Springer International Publishing, 2015.

Abstract

Wireless Sensor Networks (WSN) are often deployed in hostile or difficult scenarios, such as military battlefields and disaster recovery, where it is crucial for the network to be highly fault tolerant, scalable and decentralized. For this reason, peer-to-peer primitives such as Distributed Hash Table (DHT), which can greatly enhance the scalability and resilience of a network, are increasingly being introduced in the design of WSN’s. Securing the communication within the WSN is also imperative in hostile settings. In particular, context information, such as the network topology and the location and identity of base stations (which collect data gathered by the sensors and are a central point of failure) can be protected using traffic encryption and anonymous routing. In this paper, we propose a protocol achieving a modified version of onion routing over wireless sensor networks based on the DHT paradigm. The protocol prevents adversaries from learning the network topology using traffic analysis, and therefore p reserves the context privacy of the network. Furthermore, the proposed scheme is designed to minimize the computational burden and power usage of the nodes, through a novel partitioning scheme and route selection algorithm.

Details

Language :
English
ISBN :
978-3-319-29813-9
ISSN :
03029743
ISBNs :
9783319298139
Database :
OpenAIRE
Journal :
Information and Communications Security ISBN: 9783319298139, ICICS
Accession number :
edsair.doi.dedup.....5490b93d462b3bee8dc7ece3c30df405