Mobility

An Effective Scheme of Location Privacy Preserving in Monitoring System for WSNs

Free registration required

Executive Summary

While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location in formation is intended only for legitimate users. However, an eavesdropper can monitor the traffic and deduce the approximate location of monitored objects in certain situations. The authors first describe a successful attack against the flooding-based phantom routing, proposed in the seminal work by Celal Oz-turk, Yanyong Zhang, and Wade Trappe. Then, they propose GROW (Greedy RandOm Walk), a two-way random walk, i.e., from both source and sink, to reduce the chance an eaves-dropper can collect the location information.

  • Format: PDF
  • Size: 272.99 KB