Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
A Sorted RSSI Quantization Based Algorithm for Sensor Network Localization
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
A cognitive scheme for gateway protection in wireless sensor network
Applied Intelligence
Sink repositioning for enhanced performance in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
Nodes in a wireless sensor network (WSN) probe their surroundings and report their findings to a base-station over multi-hop paths. Given the important role of the base-station, an adversary who likes to disrupt the network operation would eagerly look for where the base-station could be and target it with attacks in order to inflict maximum damage. Unfortunately, the continuous flow of traffic towards the base-station creates a pronounced pattern of wireless links that may expose the base-station position and thus make the network more vulnerable. This paper investigates means for boosting the anonymity of the base-station. First, we adapt three models - entropy based model, GSAT test and evidence theory model, to quantify anonymity of the base-station. Then, two novel approaches for boosting the anonymity of the base-station are proposed. One is for the base-station to disguise itself by transmitting some of the data packets it receives with varying intensity. The goal is to create a perception that the base-station node is just another sensor node sending some information and thus confuse the adversary. The second approach is for the base-station to relocate itself to a more concealed position within the network. Relocating the base-station completely scraps/nullifies the adversary's efforts to track it down and forces him to start his search from scratch. This paper investigates the problem of base-station relocation with respect to when to relocate, where to relocate and how to relocate. These approaches are validated through simulation. Our results show that the proposed measures not only safeguard base-station but also increases the lifetime of the WSN due to uniform energy depletion of sensor nodes.