Title
Preserving source location privacy against the global attacker hiding in FOG
Abstract
FOG computing provides real-time service for analyzing data sensed by massive wireless embedded devices. However, an attacker can get a global view of an event-driven sensor network through the contextual information collected in FOG. We present an attack model that uses such information to analyze traffic and infer the source location. To resist traffic analysis, dummy message injection approaches have been widely applied. In previous studies, a method in which all nodes in a global scope send packets periodically gains perfect privacy but fails to provide energy-efficient and low-latency service. We propose a novel scheme, DLSA (Dark-Light Stripe Alternation). Compared with state-of-the-art techniques, our methods can not only maintain perfect privacy but also reduce the communication overhead by more than 50% and the end-to-end latency by more than 40%.
Year
DOI
Venue
2018
10.1109/ICNSC.2018.8361305
2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC)
Keywords
Field
DocType
Wireless Sensor Network,global attacker,contextual information,location privacy,random walk
Contextual information,Traffic analysis,Attack model,Wireless,Computer science,Latency (engineering),Network packet,Computer network,Control engineering,Wireless sensor network,Alternation (linguistics)
Conference
ISSN
ISBN
Citations 
1810-7869
978-1-5386-5054-7
0
PageRank 
References 
Authors
0.34
7
2
Name
Order
Citations
PageRank
Qian ZHOU13613.44
Xiaolin Qin217541.82