Indiana University Bloomington

Luddy School of Informatics, Computing, and Engineering

Technical Report TR657:
A Risk Based Approach To Limit The Effects of Covert Channels for Internet Sensor Data Aggregators For Sensor Privacy

Camilo H. Viecco and L. Jean Camp
(Feb 2008), 9 pages pages
[Is under revision to attempt publication.]
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization that participates in a sensor network risks providing a covert channel to attackers if that organizations sensor can be identified. While there is benefit for every party when any individual participates in such sensor deployments, there are perverse incentives against individual participation. As a result, Internet sensor networks currently provide limited data. Ensuring anonymity of individual sensors can decrease the risk of participating in a sensor network without limiting data provision. Two contributions are made in this paper. The first is an anonymity mechanism to defeat injection attacks. This defense mechanism is based on economics rather than classic cryptographic protocols. The second builds on the foundations created by the first. It is the a proposal for randomized sampling of correlated sensory inputs to asymmetrically increase the cost of sensor identification for attackers without significantly reducing the quality of the published data.

Available as: