Preserving context privacy in distributed hash table wireless sensor networks

Show simple item record

dc.contributor.author Palmieri, Paolo
dc.contributor.editor Qing, Sihan
dc.contributor.editor Okamoto, Eiji
dc.contributor.editor Kwangjo, Kim
dc.contributor.editor Liu, Dongmei
dc.date.accessioned 2017-09-21T14:29:45Z
dc.date.available 2017-09-21T14:29:45Z
dc.date.issued 2015-12
dc.identifier.citation Palmieri, P. (2016) 'Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks', in Qing, S., Okamoto, E., Kim, K. & Liu, D. (eds.) Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Cham: Springer International Publishing, pp. 436-444. doi: 10.1007/978-3-319-29814-6_37 en
dc.identifier.startpage 436 en
dc.identifier.endpage 444 en
dc.identifier.isbn 978-3-319-29814-6
dc.identifier.uri http://hdl.handle.net/10468/4761
dc.identifier.doi 10.1007/978-3-319-29814-6_37
dc.description.abstract Wireless Sensor Networks (WSN) are often deployed in hostile or difficult scenarios, such as military battlefields and disaster recovery, where it is crucial for the network to be highly fault tolerant, scalable and decentralized. For this reason, peer-to-peer primitives such as Distributed Hash Table (DHT), which can greatly enhance the scalability and resilience of a network, are increasingly being introduced in the design of WSN’s. Securing the communication within the WSN is also imperative in hostile settings. In particular, context information, such as the network topology and the location and identity of base stations (which collect data gathered by the sensors and are a central point of failure) can be protected using traffic encryption and anonymous routing. In this paper, we propose a protocol achieving a modified version of onion routing over wireless sensor networks based on the DHT paradigm. The protocol prevents adversaries from learning the network topology using traffic analysis, and therefore p reserves the context privacy of the network. Furthermore, the proposed scheme is designed to minimize the computational burden and power usage of the nodes, through a novel partitioning scheme and route selection algorithm. en
dc.format.mimetype application/pdf en
dc.language.iso en en
dc.publisher Springer International Publishing en
dc.relation.ispartof Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
dc.relation.uri https://link.springer.com/chapter/10.1007/978-3-319-29814-6_37
dc.rights © Springer International Publishing Switzerland 2016. The final publication is available at Springer via http://doi.org/10.1007/978-3-319-29814-6_37 en
dc.subject Wireless sensor networks en
dc.subject Context privacy en
dc.subject Anonymity en
dc.subject Onion routing en
dc.subject Distributed hash table en
dc.title Preserving context privacy in distributed hash table wireless sensor networks en
dc.type Conference item en
dc.internal.authorcontactother Paolo Palmieri, Computer Science, University College Cork, Cork, Ireland. +353-21-490-3000 Email: paolo.palmieri@ucc.ie en
dc.internal.availability Full text available en
dc.date.updated 2017-09-20T15:28:18Z
dc.description.version Accepted Version en
dc.internal.rssid 411793273
dc.description.status Peer reviewed en
dc.identifier.journaltitle Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers en
dc.internal.copyrightchecked Yes en
dc.internal.licenseacceptance Yes en
dc.internal.conferencelocation Beijing, China en
dc.internal.IRISemailaddress paolo.palmieri@ucc.ie en


Files in this item

This item appears in the following Collection(s)

Show simple item record

This website uses cookies. By using this website, you consent to the use of cookies in accordance with the UCC Privacy and Cookies Statement. For more information about cookies and how you can disable them, visit our Privacy and Cookies statement