Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Hi-index | 0.00 |
Wireless sensor networks (WSN) are becoming an attractive choice for many critical applications, such as border protection and combat field reconnaissance. In these applications, sensors probe their surroundings and send their findings to a base-station (BS) over multi-hop paths. Given the important role of the BS, an adversary who likes to disrupt the network operation would eagerly look for where the BS could be and target it with attacks in order to inflict maximum damage. The continuous flow of traffic towards the BS creates a pronounced pattern of wireless links that may expose the BS position and thus make the network more vulnerable. This paper investigates means for boosting the anonymity of the BS. First, we adapt three models -Entropy based model, GSAT test and Evidence theory model, to quantify anonymity in the context of WSN. We further customize models that conventionally measure anonymity of the entire network, to suit the BS. Then, a novel approach for boosting the anonymity of the BS is proposed. The idea is for the BS to disguise itself by transmitting some of the data packets it receives with varying intensity. The goal is to create a perception that the BS node is just another sensor node sending data and thus confuse the adversary. The approach is validated through simulation.