Abstract | ||
---|---|---|
FOG computing provides real-time service for analyzing data sensed by massive wireless embedded devices. However, an attacker can get a global view of an event-driven sensor network through the contextual information collected in FOG. We present an attack model that uses such information to analyze traffic and infer the source location. To resist traffic analysis, dummy message injection approaches have been widely applied. In previous studies, a method in which all nodes in a global scope send packets periodically gains perfect privacy but fails to provide energy-efficient and low-latency service. We propose a novel scheme, DLSA (Dark-Light Stripe Alternation). Compared with state-of-the-art techniques, our methods can not only maintain perfect privacy but also reduce the communication overhead by more than 50% and the end-to-end latency by more than 40%. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/ICNSC.2018.8361305 | 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC) |
Keywords | Field | DocType |
Wireless Sensor Network,global attacker,contextual information,location privacy,random walk | Contextual information,Traffic analysis,Attack model,Wireless,Computer science,Latency (engineering),Network packet,Computer network,Control engineering,Wireless sensor network,Alternation (linguistics) | Conference |
ISSN | ISBN | Citations |
1810-7869 | 978-1-5386-5054-7 | 0 |
PageRank | References | Authors |
0.34 | 7 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Qian ZHOU | 1 | 36 | 13.44 |
Xiaolin Qin | 2 | 175 | 41.82 |