UB ScholarWorks

Source Anonymity in WSNs using Real/Fake packet Injections

Show simple item record

dc.contributor.advisor Mahmood, Ausif
dc.contributor.author Bushnag, Anas
dc.contributor.author Abuzneid, Abdelshakour A.
dc.date.accessioned 2017-04-06T20:27:02Z
dc.date.available 2017-04-06T20:27:02Z
dc.date.issued 2017-03-24
dc.identifier.uri https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1926
dc.description.abstract Many of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring endangered species, and/or military applications in areas of interest require anonymity of the origin known as Source Location Privacy (SLP). The aim is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic on the network. Three different techniques: Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) are introduced to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques improve delivery ratio and reduce the delay and overhead of a real event's packets while keeping a high level of anonymity. en_US
dc.language.iso en_US en_US
dc.subject Privacy en_US
dc.subject Unauthorized access en_US
dc.subject Wireless sensor networks (WSN) en_US
dc.title Source Anonymity in WSNs using Real/Fake packet Injections en_US
dc.type Presentation en_US
dc.institute.department School of Engineering en_US
dc.institute.name University of Bridgeport en_US
dc.event.location Bridgeport, CT en_US
dc.event.name Faculty Research Day en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ScholarWorks


Advanced Search

Browse

My Account