Document Type
Dissertation
Degree
Doctor of Philosophy (PhD)
Major/Program
Electrical Engineering
First Advisor's Name
Niki Pissinou
First Advisor's Committee Title
committee chair
Second Advisor's Name
Deng Pan
Third Advisor's Name
S. S. Iyengar
Fourth Advisor's Name
Jeffrey Fan
Fifth Advisor's Name
Jean H. Andrian
Keywords
privacy, trajectory, security, wireless sensor networks, mobile networks
Date of Defense
10-23-2013
Abstract
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node.
This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.
Identifier
FI13120417
Recommended Citation
Jin, Xinyu, "Trajectory Privacy Preservation in Mobile Wireless Sensor Networks" (2013). FIU Electronic Theses and Dissertations. 983.
https://digitalcommons.fiu.edu/etd/983
Latex files
Included in
Digital Communications and Networking Commons, Information Security Commons, Systems and Communications Commons, Systems Architecture Commons
Rights Statement
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
Comments
Additional Committee Member:
Yimin Zhu