GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
IEEE Transactions on Mobile Computing
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Energy efficient routing with delay guarantee for sensor networks
Wireless Networks
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Decorrelating WSN traffic patterns with maximally uninformative constrained routing
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Protecting the sink location privacy in wireless sensor networks
Personal and Ubiquitous Computing
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The sinks usually in sensor networks usually broadcast their addresses for data collection. However, this common operation opens up vulnerability for adversary to attack the sinks and obstruct their normal functions. In this paper, we suggest sink anonymity as a novel approach for data collection, which protects the privacy of the sinks and avoids them to become the target of attacks. We provide sink anonymity by omitting the address of the sinks in routing, so that the identity and location of the sinks are kept private. Our proposed scheme, Randomized Routing with Hidden Address (RRHA), prevents the attackers from obtaining the receiver address by capturing the destination field of the packets or by predicting the location of the sinks by observing the flow of network traffic. We examined the successful delivery rate, packet delay, and protection strength of our proposed scheme by both analysis and simulations.