Network level privacy for wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian d'Auriol, Sungyoung Lee, Heejo Lee, Young Jae Song

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)

    Abstract

    Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network level privacy. Providing full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes, sensor networks and QoS issues. In this paper, we propose full network level privacy solution that addresses this problem. This solution comprises of Identity, Route and Location (IRL) privacy algorithm and data privacy mechanism, that collectively provides protection against privacy disclosure attacks such as eavesdropping and hop-by-hop trace back attacks.

    Original languageEnglish
    Title of host publicationProceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
    PublisherIEEE Computer Society
    Pages261-266
    Number of pages6
    ISBN (Print)9780769533247
    DOIs
    Publication statusPublished - 2008
    Event4th International Symposium on Information Assurance and Security, IAS 2008 - Napoli, Italy
    Duration: 2008 Sep 82008 Sep 10

    Publication series

    NameProceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008

    Other

    Other4th International Symposium on Information Assurance and Security, IAS 2008
    Country/TerritoryItaly
    CityNapoli
    Period08/9/808/9/10

    ASJC Scopus subject areas

    • Renewable Energy, Sustainability and the Environment
    • Management, Monitoring, Policy and Law
    • Fuel Technology
    • Energy(all)
    • Energy Engineering and Power Technology
    • Modelling and Simulation
    • Information Systems

    Fingerprint

    Dive into the research topics of 'Network level privacy for wireless sensor networks'. Together they form a unique fingerprint.

    Cite this