ANSWER: AutoNomouS netWorked sEnsoR system
Journal of Parallel and Distributed Computing
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
An experimental comparison of source location privacy methods for power optimization in WSNs
SENSIG '10/MATERIALS'10 Proceedings of the 3rd WSEAS international conference on Advances in sensors, signals and materials
Hi-index | 0.00 |
Securing wireless sensor networks against denial ofservice attacks that disrupt communications or targetnodes serving key roles in the network, e.g. sinks orrouters, is instrumental to network availability andperformance. Particularly vulnerable to these attacks arethe components of any communications or operationinfrastructure in the network. In this paper, we address aclass of wireless sensor networks where networkprotocols leverage a dynamic general-purpose virtualinfrastructure; the core components of that infrastructureare a coordinate system, a cluster structure, and a routingstructure. Since knowledge of this virtual infrastructureenables 'smart' cost-effective DOS attacks on thenetwork, maintaining the anonymity of the virtualinfrastructure is a primary security concern. The maincontribution of this work is to propose an energy-efficientprotocol for maintaining the anonymity of the networkvirtual infrastructure. Specifically, our solution definesschemes for randomizing communications such that thecoordinate system, cluster structure, and routingstructure remain invisible to an external observer ofnetwork traffic during the setup phase of the network.