Networks without user observability—design options
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Communications of the ACM
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The complexity of theorem-proving procedures
STOC '71 Proceedings of the third annual ACM symposium on Theory of computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
k-anonymous message transmission
Proceedings of the 10th ACM conference on Computer and communications security
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
On Providing Anonymity in Wireless Sensor Networks
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Lottery scheduling: flexible proportional-share resource management
OSDI '94 Proceedings of the 1st USENIX conference on Operating Systems Design and Implementation
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
A big picture on localization algorithms considering sensor logic location
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
IEEE Wireless Communications
Decorrelating WSN traffic patterns with maximally uninformative constrained routing
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Exploiting overlapping channels for minimum power configuration in real-time sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Minimum transmission power configuration in real-time sensor networks with overlapping channels
ACM Transactions on Sensor Networks (TOSN)
Perfect contextual information privacy in WSNs undercolluding eavesdroppers
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Protecting the sink location privacy in wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, the base station can be destroyed, rendering the entire sensor network inoperative, since a base station is a central point of data collection and hence failure. This paper investigates a suite of decorrelation countermeasures aimed at disguising the location of a base station against traffic analysis attacks. A set of basic countermeasures is described, including hop-by-hop reencryption of the packet to change its appearance, imposition of a uniform packet sending rate, and removal of correlation between a packet's receipt time and its forwarding time. More sophisticated countermeasures are described that introduce randomness into the path taken by a packet. Packets may also fork into multiple fake paths to further confuse an adversary. A technique is introduced to create multiple random areas of high communication activity called hot spots to deceive an adversary as to the true location of the base station. The effectiveness of these countermeasures against traffic analysis attacks is demonstrated analytically and via simulation using three evaluation criteria: total entropy of the network, total overhead/energy consumed, and the ability to frustrate heuristic-based search techniques to locate a base station.