Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

You searched for id:"oai:scholarworks.bridgeport.edu:123456789/2005". One record found.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Bridgeport

1. Bushnag, Anas. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .

Degree: 2018, University of Bridgeport

Wireless Sensor Networks WSNs have been utilized for many applications such as tracking and monitoring of endangered species in a national park, soldiers in a battlefield, and many others, which require anonymity of the origin, known as the Source Location Privacy (SLP). The aim of SLP is to prevent unauthorized observers from tracing the source of a real event (an asset) by analyzing the traffic of the network. We develop the following six techniques to provide anonymity: Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD), Controlled Dummy Adaptive Distribution (CAD), Exponential Dummy Adaptive Distribution (EDAD), Exponential Dummy Adaptive Distribution Plus One (EDADP1), and Exponential Dummy Adaptive Distribution Plus Two (EDADP2). Moreover, an enhanced version of the well-known FitProbRate technique is also developed. The purpose of these techniques is to overcome the anonymity problem against a global adversary model that has the capability of analyzing and monitoring the entire network. We perform an extensive verification of the proposed techniques via simulation, statistical, and visualization approaches. Three analytical models are developed to verify the performance of our techniques: A Visualization model is performed on the simulation data to confirm anonymity. A Neural Network model is developed to ensure that the introduced techniques preserve SLP. In addition, a Steganography model based on statistical empirical data is implemented to validate the anonymity of the proposed techniques. The Simulation demonstrates that the proposed techniques provide a reasonable delay, delivery ratio, and overhead of the real event's packets while keeping a high level of anonymity. Results show that the improved version of FitProbRate massively reduces the number of operations needed to detect the distribution type of a data sequence despite the number of intervals when compared to the original. A comprehensive comparison between EDADP1, EDADP2, and FitProbRate in terms of the average delay, anonymity level, average processing time, Anderson-Darling test, and polluted scenarios is conducted. Results show that all three techniques have a similar performance regarding the average delay and Anderson-Darling test. However, the proposed techniques outperform FitProbRate in terms of anonymity level, average processing time, and polluted scenarios. WSN applications that need privacy can select the suitable proposed technique based on the required level of anonymity with respect to delay, delivery ratio, and overhead.

Subjects/Keywords: Anonymity; Network; Privacy; Security; Source location privacy; Wireless sensor networks (WSN)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bushnag, A. (2018). Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bushnag, Anas. “Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .” 2018. Thesis, University of Bridgeport. Accessed May 20, 2018. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bushnag, Anas. “Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .” 2018. Web. 20 May 2018.

Vancouver:

Bushnag A. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . [Internet] [Thesis]. University of Bridgeport; 2018. [cited 2018 May 20]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bushnag A. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . [Thesis]. University of Bridgeport; 2018. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.