TY - GEN
T1 - Is random walk truly memoryless - Traffic analysis and source location privacy under random walks
AU - Shi, Rui
AU - Goswami, Mayank
AU - Gao, Jie
AU - Gu, Xianfeng
PY - 2013
Y1 - 2013
N2 - Random walk on a graph is a Markov chain and thus is 'memoryless' as the next node to visit depends only on the current node and not on the sequence of events that preceded it. With these properties, random walk and its many variations have been used in network routing to 'randomize' the traffic pattern and hide the location of the data sources. In this paper we examine a myth in common understanding of the memoryless property of a random walk applied for protecting source location privacy in a wireless sensor network. In particular, if one monitors only the network boundary and records the first boundary node hit by a random walk, this distribution can be related to the location of the source node. For the scenario of a single data source, a very simple algorithm by integrating along the network boundary would reveal the location of the source. We also develop a generic algorithm to reconstruct the source locations for various sources that have simple descriptions (e.g., k source locations, sources on a line segment, sources in a disk). This represents a new type of traffic analysis attack for invading sensor data location privacy and essentially re-opens the problem for further examination.
AB - Random walk on a graph is a Markov chain and thus is 'memoryless' as the next node to visit depends only on the current node and not on the sequence of events that preceded it. With these properties, random walk and its many variations have been used in network routing to 'randomize' the traffic pattern and hide the location of the data sources. In this paper we examine a myth in common understanding of the memoryless property of a random walk applied for protecting source location privacy in a wireless sensor network. In particular, if one monitors only the network boundary and records the first boundary node hit by a random walk, this distribution can be related to the location of the source node. For the scenario of a single data source, a very simple algorithm by integrating along the network boundary would reveal the location of the source. We also develop a generic algorithm to reconstruct the source locations for various sources that have simple descriptions (e.g., k source locations, sources on a line segment, sources in a disk). This represents a new type of traffic analysis attack for invading sensor data location privacy and essentially re-opens the problem for further examination.
UR - http://www.scopus.com/inward/record.url?scp=84883080374&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883080374&partnerID=8YFLogxK
U2 - 10.1109/INFCOM.2013.6567114
DO - 10.1109/INFCOM.2013.6567114
M3 - Conference contribution
AN - SCOPUS:84883080374
SN - 9781467359467
T3 - Proceedings - IEEE INFOCOM
SP - 3021
EP - 3029
BT - 2013 Proceedings IEEE INFOCOM 2013
T2 - 32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013
Y2 - 14 April 2013 through 19 April 2013
ER -