TY - JOUR
T1 - Preserving context privacy in Distributed Hash Table Wireless Sensor Networks
AU - Palmieri, Paolo
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016/3/1
Y1 - 2016/3/1
N2 - Wireless Sensor Networks (WSN) are often deployed in hostile or difficult scenarios, such as military battlefields and disaster recovery, where it is crucial for the network to be highly fault tolerant, scalable and decentralized. For this reason, peer-to-peer primitives such as Distributed Hash Table (DHT), which can greatly enhance the scalability and resilience of a network, are increasingly being introduced in the design of WSN’s. Securing the communication within the WSN is also imperative in hostile settings. In particular, context information, such as the network topology and the location and identity of base stations (which collect data gathered by the sensors and are a central point of failure) can be protected using traffic encryption and anonymous routing. In this paper, we propose a protocol achieving a modified version of onion routing over wireless sensor networks based on the DHT paradigm. The protocol prevents adversaries from learning the network topology using traffic analysis, and therefore p reserves the context privacy of the network. Furthermore, the proposed scheme is designed to minimize the computational burden and power usage of the nodes, through a novel partitioning scheme and route selection algorithm.
AB - Wireless Sensor Networks (WSN) are often deployed in hostile or difficult scenarios, such as military battlefields and disaster recovery, where it is crucial for the network to be highly fault tolerant, scalable and decentralized. For this reason, peer-to-peer primitives such as Distributed Hash Table (DHT), which can greatly enhance the scalability and resilience of a network, are increasingly being introduced in the design of WSN’s. Securing the communication within the WSN is also imperative in hostile settings. In particular, context information, such as the network topology and the location and identity of base stations (which collect data gathered by the sensors and are a central point of failure) can be protected using traffic encryption and anonymous routing. In this paper, we propose a protocol achieving a modified version of onion routing over wireless sensor networks based on the DHT paradigm. The protocol prevents adversaries from learning the network topology using traffic analysis, and therefore p reserves the context privacy of the network. Furthermore, the proposed scheme is designed to minimize the computational burden and power usage of the nodes, through a novel partitioning scheme and route selection algorithm.
KW - Anonymity
KW - Context privacy
KW - Distributed hash table
KW - Onion routing
KW - Wireless sensor networks
UR - https://www.scopus.com/pages/publications/84960865355
U2 - 10.1007/978-3-319-29814-6_37
DO - 10.1007/978-3-319-29814-6_37
M3 - Article
AN - SCOPUS:84960865355
SN - 0302-9743
VL - 9543
SP - 436
EP - 444
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
ER -