Source location privacy (SLP) is an important property for a large class of security-critical wireless sensor network (WSN) applications such as monitoring and tracking. In the seminal work on SLP, phantom routing was proposed as a viable approach to address SLP. However, recent work has shown some limitations of phantom routing such as poor data yield and low SLP. In this paper, we propose phantom walkabouts, a novel and more general version of phantom routing, which performs phantom routes of variable lengths. Through extensive simulations, we show that phantom walkabouts provides high SLP level than phantom routing under specific network configuration.
KEYWORDSbiased random walk, phantom routing, phantom walkabouts, source location privacy, wireless sensor networks
INTRODUCTIONA wireless sensor network (WSN) consists of a number of tiny devices, known as sensor nodes, that can sense different attributes of the environment and use radio signals to communicate among themselves. WSNs have enabled the development of many novel applications, including asset monitoring, 1 target tracking, 2 and environment control 3 among others, with low levels of intrusiveness. They are also expected to be deployed in safety and security-critical systems, including military 4 and medical services. 5 The communication protocols used in the WSNs must therefore meet a set of stringent security and privacy requirements, dependent on the application.Threats to privacy in monitoring applications can be considered along two dimensions, ie, (1) content-based threats and (2) context-based threats. Content-based privacy threats relate to use of the content of the messages broadcast by sensor nodes, such as an attacker gaining the ability to read an eavesdropped encrypted message. There has been much research addressing the issue of providing content privacy, eg, SPINS, 6 with most efforts in this area focusing on the use of cryptographic techniques. On the other hand, context-based privacy threats focus on the context in which messages are broadcast and how information can be observed or inferred by attackers. Context is a multi-attribute concept that encompasses situational aspects of broadcast messages, including environmental and temporal information.It is often desirable for the source of sensed information to be kept private in a WSN. For example, in a military application, a soldier transmitting messages may unintentionally disclose their location, even when encryption is used. Another example is during the monitoring of endangered species where poachers may be tempted to infer the location of the animal to capture it. Real world examples include monitoring badgers 2 and the WWF's Wildlife Crime Technology Report, 7 both of which would likely benefit from a context-based security measure. In this paper, we focus on protecting the source location.Techniques that protect this source location are said to provide source location privacy (SLP). SLP is important in many application domains, though it is of utmost concern in security-critica...