By Topic

An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Rong Jiang ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China ; Jun Luo ; Xiaoping Wang

The challenging nature of insecure wireless channels and constrained resources make protection for wireless sensor networks (WSNs) an especially essential problem. The existing work has focused on preventive techniques to achieve location privacy protection, while the location privacy risk assessment receives less attention. In this paper, we propose a novel risk assessment approach to evaluate the risk of WSNs privacy based on attack tree. Using the attack tree model, we can estimate the degree that a certain threat might bring to the WSNs and identify possible attack sequences that an attacker may launch towards the privacy preserving system in WSNs. Then we adopted the multi-attribute utility theory to calculate the system's total risk value as well as the probabilities of each attack sequence. The analysis results can provide support for decision makers to make corresponding protection measures of location privacy.

Published in:

Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on

Date of Conference:

21-23 Sept. 2012