Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability

被引:18
作者
Bicakci, Kemal [1 ]
Bagci, Ibrahim Ethem [1 ]
Tavli, Bulent [1 ]
机构
[1] TOBB Univ Econ & Technol, TR-06560 Ankara, Turkey
关键词
Wireless sensor networks; linear programming; energy efficiency; network lifetime; location privacy; sink location;
D O I
10.1109/LCOMM.2011.010311.101885
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In wireless sensor networks an attack to the base station (sink) can render the whole network useless. Hence, concealing the physical location of the sink may be necessary in certain circumstances. Previous studies addressing this challenging problem assume a weak adversary model. The problem has not been studied in the presence of an eavesdropper who has global knowledge for the entire network. Here, a naive solution is to employ fake sinks so that nodes send their data not only to the real sink but also to other locations. An alternative solution with less overhead could be provided when all nodes including base station equalize the values of their total incoming and outgoing flows as well as their energy expenditure. This way, no information about the sink location is revealed even when all communication within the network is monitored. In this paper, through a Linear Programming (LP) framework we analyze and compare lifetime limits of wireless sensor networks preserving sink location privacy with the aforementioned two approaches.
引用
收藏
页码:205 / 207
页数:3
相关论文
共 6 条
  • [1] Brook A., 1998, GAMS, a User's Guide
  • [2] General network lifetime and cost models for evaluating sensor network deployment strategies
    Cheng, Zhao
    Perillo, Mark
    Heinzelman, Wendi B.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (04) : 484 - 497
  • [3] Countermeasures against traffic analysis attacks in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 113 - 124
  • [4] On multi-hop routing for energy efficiency
    Ergen, SC
    Varaiya, P
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (10) : 880 - 881
  • [5] Location privacy in sensor networks against a global eavesdropper
    Mehta, Kiran
    Liu, Donggang
    Wright, Matthew
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2007, : 314 - 323
  • [6] Yang Y, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P77