Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Tracking a moving object with a binary sensor network
Proceedings of the 1st international conference on Embedded networked sensor systems
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Sensor network-based countersniper system
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
The flooding time synchronization protocol
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Robust distributed network localization with noisy range measurements
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
An analysis of a large scale habitat monitoring application
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
TinyDB: an acquisitional query processing system for sensor networks
ACM Transactions on Database Systems (TODS) - Special Issue: SIGMOD/PODS 2003
Lightweight detection and classification for wireless sensor networks in realistic environments
Proceedings of the 3rd international conference on Embedded networked sensor systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Using clustering information for sensor network localization
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
A big picture on localization algorithms considering sensor logic location
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Zeroing-in on network metric minima for sink location determination
Proceedings of the third ACM conference on Wireless network security
An approach for increasing base-station anonymity in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Increasing base-station anonymity in wireless sensor networks
Ad Hoc Networks
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Event handoff unobservability in WSN
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryption is used to protect the actual contents of the messages. The communication patterns, which often reveal higher volumes of traffic near the sink, could allow an attacker to identify the vicinity of the sink node. With this information, an attacker could potentially disable the network by destroying the sink. In this paper, we present the decoy sink protocol, which protects the location of the sink in target tracking sensor network applications by forwarding data to a decoy sink for aggregation before the aggregated data is forwarded to the real sink from the decoy sink. Combining indirection and data aggregation in our protocol creates more traffic away from the sink and reduces the amount of traffic near the sink, which makes traffic analysis more difficult for attackers.