Redirigiendo al acceso original de articulo en 23 segundos...
ARTÍCULO
TITULO

A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs

Islam T. Almalkawi    
Jafar Raed    
Ayoub Alsarhan    
Alaa Abdallah    
Emad Abdallah    

Resumen

Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the privacy of the contextual information. Contextual information such as event occurrence, event time, and event location can be exposed to an adversary by just monitoring network packet transmission. This kind of information is very important because it can leak location information of key nodes or even detected events themselves. Therefore, proposing a contextual unobservability scheme is a challenging task in sensor networks considering many issues: the broadcast nature of the wireless channel, the different attacker models, the network resource constraints, and the overhead on system performance. Most of the existing location privacy schemes are not addressing all these issues and are either not efficient against global adversaries or degrade significantly network performance. Thus in this paper, we propose an efficient location contextual anonymity scheme for Wireless Multimedia Sensor Network (WMSN) that exploits the cross-layer joint design among the application, routing, and MAC layers. Our proposed location unobservability scheme combines the source coding technique, probabilistic packet transmission, multipath routing, and priority-based dropping policy to enhance the efficiency level of the provided privacy service without noticeably affecting the Quality of Service (QoS) requirement for delivering multimedia content in WMSN. Performance evaluation results show that our proposed privacy mechanism outperforms other proposed location privacy techniques in terms of privacy efficiency (safety period) and network performance (end-to-end delay and energy consumption).

 Artículos similares

       
 
Li Li and Kyung Soo Jun    
River flood routing computes changes in the shape of a flood wave over time as it travels downstream along a river. Conventional flood routing models, especially hydrodynamic models, require a high quality and quantity of input data, such as measured hyd... ver más
Revista: Water

 
Juan Francisco Mora-Sánchez, Josep Ribes, Josué González-Camejo, Aurora Seco and María Victoria Ruano    
This research lays a foundation for optimised membrane photobioreactor performance and introduces novel control parameters crucial for advancing microalgae cultivation techniques and promoting environmental sustainability. Particularly, this study presen... ver más
Revista: Water

 
Mengping Huang, Shuai Ma, Jinrong He, Wei Xue, Xueyan Hou, Yuqi Zhang, Xiaofeng Liu, Heping Bai and Ran Li    
Amino acids found in minor coarse cereals are essential for human growth and development and play a crucial role in efficient and rapid quantitative detection. Surface-enhanced Raman spectroscopy (SERS) enables nondestructive, efficient, and rapid sample... ver más
Revista: Applied Sciences

 
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim    
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt... ver más
Revista: Applied Sciences

 
Junyi Chen, Yanyun Shen, Yinyu Liang, Zhipan Wang and Qingling Zhang    
Aircraft detection in SAR images of airports remains crucial for continuous ground observation and aviation transportation scheduling in all weather conditions, but low resolution and complex scenes pose unique challenges. Existing methods struggle with ... ver más
Revista: Applied Sciences