SlideShare a Scribd company logo
1 of 30
Enhancing Source-Location Privacy in
     Sensor Network Routing

    P. Kamat, Y. Zhang, W. Trappe and C. Ozturk
  Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems
                                Rutgers University


                           Matthew Sanderson




                                                                                  1
Presentation Outline
   Introduction to issue
   Panda vs Hunter
   Techniques for Stationary Sources
        Routing Protocols
       Performance Comparison
       Improvement for privacy.
   (Briefly) Mobile Sources
   Related/Future Work
   Conclusion
   Questions

                                        2
The issue is privacy.

   “Guarantee that information is observable or decipherable
    by only those who are intentionally meant to observe or
    decipher it.”

   Two broad categories:
      content-oriented
      context-oriented


                                                                3
Content-oriented Security/Privacy


   Security of the contents of
    messages.
   Cryptographic methods.




                                          4
Contextual Privacy

   Deals with context in
    which the sensor
    application works.
   In this case: location
   Not as thoroughly
    researched.
   What this paper covers.




                                      5
Source-location Privacy


   Privacy of the node sending the initial message.

   Two metrics:
      safety period – how long until the node is
      discovered
      capture likelihood – how likely it will get discovered


                                                               6
Accomplishing source-location privacy


   Look at popular routing techniques.
   Augment these techniques with a new approach.
   Energy consumption still important.




                                                    7
Panda-Hunter Game Model Scenario

   Panda-Hunter Game:
       A sensor network has been
       deployed to monitor a panda
       habitat.
       Sensors send Panda_Here
       messages
       Messages are forwarded to a data
       sink.
       The hunter observes packets and
       traces his way back to the panda.


   Privacy Goal: Increase the time
    needed for an adversary to track
    and capture the panda (safety           Data Sink
    period).
                                            Sensor Node



                      Slide source: Wenyuan Xu
                                                          8
Additional Game Setup Issues


   One panda – one source

   Additional Goal: deliver
    messages to base station.

   Concern: energy usage.
                                Data Sink

                                Sensor Node




                                              9
The Hunter
   Non-malicious – does not
    interfere with network
   Device-rich – has devices to
    measure angle of arriving
    message
   Resource-rich – move at any
    rate and unlimited power
   Informed – knows how the
    network works


                                    10
How the hunter gets each message.

   Two primary routing
    techniques.
      Flooding
      Single-path

   New approach: Phantom
    Routing.



                                         11
Routing Techniques - Flooding
   Flooding-based: source
    sends the message to all
    its neighbors, who in turn
    do the same.
   If node has received it
    already, the node discards
    it.
   Performance
    drawbacks, but easy
    implementation.

                                          12
Probabilistic Flooding
   Like flooding, but with a
    probability.
   When a node receives a
    message, it randomly
    generates a number
    uniformly distributed
    between 0 and 1.
   If # < forwarding
    probability, it
    sends, otherwise, it
    doesn't.
                                         13
Single-Path Routing


   Instead of sending out to all
    neighbors, single-path sends
    out to one or a small subset
    of neighbors.
   Usually require extra
    hardware or a pre-
    configuration phase.
                                    Data Sink

                                    Sensor Node




                                                  14
How well do they work?




                         15
Performance Comparison cont.




                               16
Privacy of Routing Techniques

   Problems with single-path and flooding
       Single-path reduces energy, but poor at protecting source-
       location privacy.
       Flooding isn't any better, because the shortest-path is still
       contained within the flood.
       Probabilistic flooding helps – higher safety period, but at the cost
       of delivery ratio.
   There is room for improvement.
       Maybe trick the hunter?



                                                                              17
Routing with Fake Sources

   Idea: inject fake messages
    to throw off hunter.
   Multiple ways this can be
    done.
      Short-lived – similar to
      probabilistic flooding.




                                       18
Persistent Fake Source
   Short-lived fake sources can only draw the hunter away
    momentarily.
   A persistent fake source is more effective, but requires a
    global overview of network.
   Source sends its hop count to sink – sink instigates a fake
    source at a node with the same hop count in the opposite
    direction.
   Works best when fake source sends at higher rate than
    real source, but requires large energy budget.


                                                                  19
Problem with Fake Sources: Perceptive Hunter



   Recall the assumptions on our hunter – he's informed.
   Once he realizes the fake source, he knows which
    direction to go for the real source.

   We need a new approach.




                                                            20
Phantom Routing
   Idea: entice hunter to
    phantom instead of
    source.
   Has two phases:
       Random walk phase
       Flood/Single-path
       phase




                                       21
Types of Random Walk

   Sector-based – requires
    knowledge of landmark
    nodes to send message
    away from source.
   Hop-based – requires
    knowledge of the hop
    count from each node to
    the base station.



                                     22
Phantom Routing Performance
   Can significantly improve
    the safety period.
   Higher the
    hopcount, higher the
    safety period.
   Also increases latency
    (Random walk of 20: 30%
    increase = 4x privacy).




                                         23
Possible Counter: Cautious Hunter

   Since the phantom routing may leave the hunter
    stranded, after some time, the cautious hunter may go
    back.

   No benefit – no progress made by hunter.
   Better to be patient.




                                                            24
Mobile Source
   Need to rethink entire
    process again.

   Depends on panda's
    movement pattern and
    velocity.




                                      25
Panda Velocity

   More profound on single-path routing, as subsequent
    route may have little overlap compared to flooding.

   Panda's speed with single-path is protection enough.

   Improves privacy of phantom routing.




                                                           26
Hunter's Range

Not so surprising, if the
 hunter's hearing range is
 increased, the hunter is
 more effective.




                                   27
Related/Future Material

   Entrapping Adversaries for Source Protection in Sensor Networks
       Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon – Dartmouth College

   Preserving Source Location Privacy in Monitoring-based Wireless Sensor
    Networks
       Yong Xi, Loren Schwiebert, Weisong Shi – Wayne State University

   Location Privacy in Sensor Networks Against a Global Eavesdropper
       Kiran Mehta, Donggang Liu, Matthew Wright – University of Texas at Arlington




                                                                                              28
Conclusion

   The panda-hunter game is somewhat contrived.
      Does a great job at visualizing concept.
   Concept is simple and effective.
   Source-location privacy for sensor networks seems to be
    a minor issue.
      I'm willing to admit I'm wrong here.
      Come up with some examples.




                                                              29
Questions?



   ?

             30

More Related Content

What's hot

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
Iaetsd Iaetsd
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
ijdpsjournal
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioral
IJNSA Journal
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networks
Praveen Yadav
 

What's hot (17)

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
N0704075079
N0704075079N0704075079
N0704075079
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
01438360
0143836001438360
01438360
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Bi24385389
Bi24385389Bi24385389
Bi24385389
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioral
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networks
 

Viewers also liked

4 que entiendo por desarrollo fisico
4 que entiendo por desarrollo fisico4 que entiendo por desarrollo fisico
4 que entiendo por desarrollo fisico
amaliafdz
 
Universidad nacional de chimborazo
Universidad nacional  de chimborazoUniversidad nacional  de chimborazo
Universidad nacional de chimborazo
washington1987
 
User Experience Flight Check
User Experience Flight CheckUser Experience Flight Check
User Experience Flight Check
jharr
 
Revista Suma2- Matemática
Revista Suma2- MatemáticaRevista Suma2- Matemática
Revista Suma2- Matemática
aarj_15
 
Matti Pauna SOED 2016
Matti Pauna SOED 2016Matti Pauna SOED 2016
Matti Pauna SOED 2016
Colleen Ganley
 
Grafico diario del dax perfomance index para el 09 08-2013
Grafico diario del dax perfomance index para el 09 08-2013Grafico diario del dax perfomance index para el 09 08-2013
Grafico diario del dax perfomance index para el 09 08-2013
Experiencia Trading
 
Getting started copy 2 www.google.com
Getting started copy 2 www.google.comGetting started copy 2 www.google.com
Getting started copy 2 www.google.com
Hitesh Sharma
 
สมัคร Google analytics
สมัคร Google analyticsสมัคร Google analytics
สมัคร Google analytics
PHIRAPHON PENMAS
 
8bb42b 98c095d8507342e0b25f19c802c0ebb7
8bb42b 98c095d8507342e0b25f19c802c0ebb78bb42b 98c095d8507342e0b25f19c802c0ebb7
8bb42b 98c095d8507342e0b25f19c802c0ebb7
yongzsoh
 
20th Century in Black and White Photos (2)
20th Century in Black and White Photos (2)20th Century in Black and White Photos (2)
20th Century in Black and White Photos (2)
guimera
 

Viewers also liked (20)

4 que entiendo por desarrollo fisico
4 que entiendo por desarrollo fisico4 que entiendo por desarrollo fisico
4 que entiendo por desarrollo fisico
 
Universidad nacional de chimborazo
Universidad nacional  de chimborazoUniversidad nacional  de chimborazo
Universidad nacional de chimborazo
 
Servo press auloma catalogue
Servo press auloma catalogueServo press auloma catalogue
Servo press auloma catalogue
 
User Experience Flight Check
User Experience Flight CheckUser Experience Flight Check
User Experience Flight Check
 
てすと4
てすと4てすと4
てすと4
 
Stars ncsehe-sue trinidad
Stars ncsehe-sue trinidadStars ncsehe-sue trinidad
Stars ncsehe-sue trinidad
 
Revista Suma2- Matemática
Revista Suma2- MatemáticaRevista Suma2- Matemática
Revista Suma2- Matemática
 
Verruga Peruana: An Infectious Endemic Angiomatosis
Verruga Peruana: An Infectious Endemic AngiomatosisVerruga Peruana: An Infectious Endemic Angiomatosis
Verruga Peruana: An Infectious Endemic Angiomatosis
 
Matti Pauna SOED 2016
Matti Pauna SOED 2016Matti Pauna SOED 2016
Matti Pauna SOED 2016
 
Grafico diario del dax perfomance index para el 09 08-2013
Grafico diario del dax perfomance index para el 09 08-2013Grafico diario del dax perfomance index para el 09 08-2013
Grafico diario del dax perfomance index para el 09 08-2013
 
Getting started copy 2 www.google.com
Getting started copy 2 www.google.comGetting started copy 2 www.google.com
Getting started copy 2 www.google.com
 
สมัคร Google analytics
สมัคร Google analyticsสมัคร Google analytics
สมัคร Google analytics
 
Sub Prime in simple words :)
Sub Prime in simple words :)Sub Prime in simple words :)
Sub Prime in simple words :)
 
8bb42b 98c095d8507342e0b25f19c802c0ebb7
8bb42b 98c095d8507342e0b25f19c802c0ebb78bb42b 98c095d8507342e0b25f19c802c0ebb7
8bb42b 98c095d8507342e0b25f19c802c0ebb7
 
India’s !st & only Hollywood benchmarked studio facility
India’s !st & only Hollywood benchmarked studio facilityIndia’s !st & only Hollywood benchmarked studio facility
India’s !st & only Hollywood benchmarked studio facility
 
Servo presses - Servopressen, sheet metal working
Servo presses - Servopressen, sheet metal workingServo presses - Servopressen, sheet metal working
Servo presses - Servopressen, sheet metal working
 
Lack of mobile connectivity is biggest fear of Indian travelers era wudstay t...
Lack of mobile connectivity is biggest fear of Indian travelers era wudstay t...Lack of mobile connectivity is biggest fear of Indian travelers era wudstay t...
Lack of mobile connectivity is biggest fear of Indian travelers era wudstay t...
 
Sobre la revolución tecnológica en el sector financiero
Sobre la revolución tecnológica en el sector financieroSobre la revolución tecnológica en el sector financiero
Sobre la revolución tecnológica en el sector financiero
 
20th Century in Black and White Photos (2)
20th Century in Black and White Photos (2)20th Century in Black and White Photos (2)
20th Century in Black and White Photos (2)
 
Monster Salary Index 2016
Monster Salary Index 2016Monster Salary Index 2016
Monster Salary Index 2016
 

Similar to Panda lacotion

Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
IJTET Journal
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Imran Khan
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 

Similar to Panda lacotion (20)

Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
A cloud based scheme for protecting
A cloud based scheme for protectingA cloud based scheme for protecting
A cloud based scheme for protecting
 
P017129296
P017129296P017129296
P017129296
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
best jewelry
best jewelrybest jewelry
best jewelry
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A SurveyDetection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 

Panda lacotion

  • 1. Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems Rutgers University Matthew Sanderson 1
  • 2. Presentation Outline  Introduction to issue  Panda vs Hunter  Techniques for Stationary Sources Routing Protocols Performance Comparison Improvement for privacy.  (Briefly) Mobile Sources  Related/Future Work  Conclusion  Questions 2
  • 3. The issue is privacy.  “Guarantee that information is observable or decipherable by only those who are intentionally meant to observe or decipher it.”  Two broad categories: content-oriented context-oriented 3
  • 4. Content-oriented Security/Privacy  Security of the contents of messages.  Cryptographic methods. 4
  • 5. Contextual Privacy  Deals with context in which the sensor application works.  In this case: location  Not as thoroughly researched.  What this paper covers. 5
  • 6. Source-location Privacy  Privacy of the node sending the initial message.  Two metrics: safety period – how long until the node is discovered capture likelihood – how likely it will get discovered 6
  • 7. Accomplishing source-location privacy  Look at popular routing techniques.  Augment these techniques with a new approach.  Energy consumption still important. 7
  • 8. Panda-Hunter Game Model Scenario  Panda-Hunter Game: A sensor network has been deployed to monitor a panda habitat. Sensors send Panda_Here messages Messages are forwarded to a data sink. The hunter observes packets and traces his way back to the panda.  Privacy Goal: Increase the time needed for an adversary to track and capture the panda (safety Data Sink period). Sensor Node Slide source: Wenyuan Xu 8
  • 9. Additional Game Setup Issues  One panda – one source  Additional Goal: deliver messages to base station.  Concern: energy usage. Data Sink Sensor Node 9
  • 10. The Hunter  Non-malicious – does not interfere with network  Device-rich – has devices to measure angle of arriving message  Resource-rich – move at any rate and unlimited power  Informed – knows how the network works 10
  • 11. How the hunter gets each message.  Two primary routing techniques. Flooding Single-path  New approach: Phantom Routing. 11
  • 12. Routing Techniques - Flooding  Flooding-based: source sends the message to all its neighbors, who in turn do the same.  If node has received it already, the node discards it.  Performance drawbacks, but easy implementation. 12
  • 13. Probabilistic Flooding  Like flooding, but with a probability.  When a node receives a message, it randomly generates a number uniformly distributed between 0 and 1.  If # < forwarding probability, it sends, otherwise, it doesn't. 13
  • 14. Single-Path Routing  Instead of sending out to all neighbors, single-path sends out to one or a small subset of neighbors.  Usually require extra hardware or a pre- configuration phase. Data Sink Sensor Node 14
  • 15. How well do they work? 15
  • 17. Privacy of Routing Techniques  Problems with single-path and flooding Single-path reduces energy, but poor at protecting source- location privacy. Flooding isn't any better, because the shortest-path is still contained within the flood. Probabilistic flooding helps – higher safety period, but at the cost of delivery ratio.  There is room for improvement. Maybe trick the hunter? 17
  • 18. Routing with Fake Sources  Idea: inject fake messages to throw off hunter.  Multiple ways this can be done. Short-lived – similar to probabilistic flooding. 18
  • 19. Persistent Fake Source  Short-lived fake sources can only draw the hunter away momentarily.  A persistent fake source is more effective, but requires a global overview of network.  Source sends its hop count to sink – sink instigates a fake source at a node with the same hop count in the opposite direction.  Works best when fake source sends at higher rate than real source, but requires large energy budget. 19
  • 20. Problem with Fake Sources: Perceptive Hunter  Recall the assumptions on our hunter – he's informed.  Once he realizes the fake source, he knows which direction to go for the real source.  We need a new approach. 20
  • 21. Phantom Routing  Idea: entice hunter to phantom instead of source.  Has two phases: Random walk phase Flood/Single-path phase 21
  • 22. Types of Random Walk  Sector-based – requires knowledge of landmark nodes to send message away from source.  Hop-based – requires knowledge of the hop count from each node to the base station. 22
  • 23. Phantom Routing Performance  Can significantly improve the safety period.  Higher the hopcount, higher the safety period.  Also increases latency (Random walk of 20: 30% increase = 4x privacy). 23
  • 24. Possible Counter: Cautious Hunter  Since the phantom routing may leave the hunter stranded, after some time, the cautious hunter may go back.  No benefit – no progress made by hunter.  Better to be patient. 24
  • 25. Mobile Source  Need to rethink entire process again.  Depends on panda's movement pattern and velocity. 25
  • 26. Panda Velocity  More profound on single-path routing, as subsequent route may have little overlap compared to flooding.  Panda's speed with single-path is protection enough.  Improves privacy of phantom routing. 26
  • 27. Hunter's Range Not so surprising, if the hunter's hearing range is increased, the hunter is more effective. 27
  • 28. Related/Future Material  Entrapping Adversaries for Source Protection in Sensor Networks Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon – Dartmouth College  Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks Yong Xi, Loren Schwiebert, Weisong Shi – Wayne State University  Location Privacy in Sensor Networks Against a Global Eavesdropper Kiran Mehta, Donggang Liu, Matthew Wright – University of Texas at Arlington 28
  • 29. Conclusion  The panda-hunter game is somewhat contrived. Does a great job at visualizing concept.  Concept is simple and effective.  Source-location privacy for sensor networks seems to be a minor issue. I'm willing to admit I'm wrong here. Come up with some examples. 29
  • 30. Questions? ? 30