Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Anonymous topology discovery for multihop wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
On providing sink anonymity for sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
On providing location privacy for mobile sinks in wireless sensor networks
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Protecting source location privacy in wireless sensor networks with data aggregation
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
A novel scheme for protecting receiver's location privacy in wireless sensor networks
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. Therefore, location privacy, particularly the location privacy of the sink node, requires ultimate protection because of its critical position in WSNs. In this paper, we propose a sink location privacy protection scheme by injecting fake packets, but every real packet is still routed along its shortest path. The fake packets are routed to some random destinations and some fake sinks in order to provide the path diversity. It is difficult for an attacker to distinguish the real packets from the fake packets. Thus, the chance of finding the real sink by packet-tracing attack is reduced. Privacy analysis shows that the sink location privacy can be protected better with higher successful probability. We examine the packet travel delay, safe time, and energy consumption by both mathematical analysis and simulations.