Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
PrivaSense: providing privacy protection for sensor networks
Proceedings of the 5th international conference on Embedded networked sensor systems
Packet Cloaking: Protecting Receiver Privacy Against Traffic Analysis
NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Preserving source location privacy in monitoring-based wreless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
A novel scheme for protecting receiver's location privacy in wireless sensor networks
IEEE Transactions on Wireless Communications
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
In wireless sensor networks (WSNs), sinks or base stations are the key nodes of the networks which receive and process data from sensor nodes, hence their location should be protected well. However, they can easy fall prey to attacks launched by adversaries. In this paper, we propose a novel countermeasure Maelstrom to protect the location privacy of the key nodes in WSNs from both traffic analysis and packet tracing attacks. The basic idea of Maelstrom is to pre-assign several maelstrom areas in a network, which serve as the destinations of fake packets generated by sensor nodes. We also propose an Approximate Shortest Routing protocol (ASR) for packet delivery. Combining ASR with maelstroms congregated by fake packets, an adversary who launches both traffic analysis and packet tracing attack will be thwarted. The simulation results show that, compared with LPR combined with fake packet injection, under similar energy cost, Maelstrom can remarkably enhance the security of receiver-location in WSNs.