Load-conscious maximization of base-station location privacy in wireless sensor networks

被引:21
作者
Baroutis, Nikolaos [1 ]
Younis, Mohamed [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
Location privacy; Anonymity; Traffic analysis techniques; Wireless sensor networks; ANONYMITY;
D O I
10.1016/j.comnet.2017.06.021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects and analyzes the incoming data, but also interfaces the WSN to a higher authority. The unique role of the BS attracts adversary's attention since it can be a single point of failure for the WSN. An adversary that seeks to diminish the network utility can apply traffic analysis techniques in order to uncover the sink of all traffic (i.e., the BS) and target it with denial of service attacks. In this paper, we present a technique for preserving location privacy of the BS. Our technique injects deceptive transmissions aiming to even the traffic density across the network and make the BS undistinguishable. We highlight the trade-off between location privacy and network's performance/lifetime, and show how our technique strikes a balance between conflicting metrics. The simulation results confirm that our proposed traffic analysis countermeasure effectively boosts the location privacy of the BS without a significant impact on the network's performance and lifetime. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:126 / 139
页数:14
相关论文
共 44 条
[1]   Increasing base-station anonymity in wireless sensor networks [J].
Acharya, Uday ;
Younis, Mohamed .
AD HOC NETWORKS, 2010, 8 (08) :791-809
[2]  
Alcyildiz I. F., 2002, COMPUTER NETWORKS, V38, P393, DOI DOI 10.1016/S1389-1286(01)00302-4
[3]  
Alsemairi S., 2016, P IEEE WIR COMM NETW, P1
[4]   Clustering-based Mitigation of Anonymity Attacks in Wireless Sensor Networks [J].
Alsemairi, Sami ;
Younis, Mohamed .
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
[5]  
Alsemairi S, 2015, INT WIREL COMMUN, P337, DOI 10.1109/IWCMC.2015.7289106
[6]  
[Anonymous], 2001, MOBICOM 2001 P 7 ANN
[7]  
Bangash Y, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P158, DOI 10.1109/NAS.2015.7255210
[8]  
Baroutis N., 2017, SECUR COMMUN NETW
[9]  
Baroutis N, 2016, GLOB COMM C GLOBECOM, V4, P1
[10]  
Baroutis N, 2015, C LOCAL COMPUT NETW, P109, DOI 10.1109/LCN.2015.7366289