A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs
DOI:
https://doi.org/10.3991/ijim.v15i03.18327Keywords:
Wireless Multimedia Sensor Network (WMSN), Contextual Unobservability, Source/Sink Location Privacy, image processing, Global Attacks, Priority Packet Dropping, and Cross-layer OptimizationAbstract
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the privacy of the contextual information. Contextual information such as event occurrence, event time, and event location can be exposed to an adversary by just monitoring network packet transmission. This kind of information is very important because it can leak location information of key nodes or even detected events themselves. Therefore, proposing a contextual unobservability scheme is a challenging task in sensor networks considering many issues: the broadcast nature of the wireless channel, the different attacker models, the network resource constraints, and the overhead on system performance. Most of the existing location privacy schemes are not addressing all these issues and are either not efficient against global adversaries or degrade significantly network performance. Thus in this paper, we propose an efficient location contextual anonymity scheme for Wireless Multimedia Sensor Network (WMSN) that exploits the cross-layer joint design among the application, routing, and MAC layers. Our proposed location unobservability scheme combines the source coding technique, probabilistic packet transmission, multipath routing, and priority-based dropping policy to enhance the efficiency level of the provided privacy service without noticeably affecting the Quality of Service (QoS) requirement for delivering multimedia content in WMSN. Performance evaluation results show that our proposed privacy mechanism outperforms other proposed location privacy techniques in terms of privacy efficiency (safety period) and network performance (end-to-end delay and energy consumption).
Downloads
Published
How to Cite
Issue
Section
License
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.
This journal has been awarded the SPARC Europe Seal for Open Access Journals (What's this?)