A Novel Approach for Boosting Base Station Anonymity in a WSN

نویسندگان

  • Vicky Kumar
  • Ashok Kumar
چکیده

Nodes in a wireless sensor network scrutinize the nearby region and transmit their findings to the base station (BS) using multi-hop transmission. As the BS plays an important role in a wireless sensor network, therefore an adversary who wants to interrupt the operation of the network would avidly look for the BS location and imposes maximum damage by destroying the BS physically. The multi-hop data transmission towards BS makes a prominent pattern of the traffic (huge traffic near the BS region) that indicates the presence of BS in the nearby region and thus the location of the BS may expose to the adversaries. This work aims to provide a novel approach which will increase the BS anonymity. For this purpose, a randomly roamed BS and the special nodes are proposed to achieve the above mentioned objective. The special nodes produce a large number of high traffic regions, which are similar to the BS region. Now, there are many regions which look like BS region and hence the probability to get the BS region using traffic analysis is very low. Therefore, this approach increases the effort of adversaries in order to find the exact BS position. We have used a standard entropy model to measure the anonymity of the base station and the GSAT test is used to calculate the number of steps required to find the base station. The results show that the proposed technique provides better results in terms of anonymity compared to the existing techniques. Keywords—Anonymity; network lifetime; wireless sensor networks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the security and reliability of wireless sensor networks based on an effective algorithm for boosting base station anonymity

Wireless sensor networks (WSNs) have shown great potential for serving a full spectrum of applications in a wide variety of environments. Of special interests are applications that operate in hostile setups such as combat zones and territorial border. These applications are categorized with the presence of adversaries who are eager to attack the network. The most effective approach for an adver...

متن کامل

Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks

Wireless Sensor Networks (WSNs) often serve mission-critical applications in hostile environments and may be thus a subject to attacks. Since the sensor data are collected at in situ base-station (BS), an adversary can inflict the maximal damage to a WSN by pinpointing the BS. In this paper, we propose three novel approaches for boosting the anonymity of the BS nodes to protect them from potent...

متن کامل

Base Station Controlled Intelligent Clustering Routing in Wireless Sensor Networks

The main constrains for Wireless Sensor Network (WSN) are its limited energy and bandwidth. In industry, WSN deployed with massive node density produces lots of sensory traffic with redundancy. Accordingly, it decreases the network lifetime. In our proposed approach, we investigate the problem on energy-efficient routing for a WSN in a radio harsh environment. We propose a novel approach to cre...

متن کامل

A New Method for Clustering Wireless Sensor Networks to Improve the Energy Consumption

Clustering is an effective approach for managing nodes in Wireless Sensor Network (WSN). A new method of clustering mechanism with using Binary Gravitational Search Algorithm (BGSA) in WSN, is proposed in this paper to improve the energy consumption of the sensor nodes. Reducing the energy consumption of sensors in WSNs is the objective of this paper that is through selecting the sub optimum se...

متن کامل

A Novel Energy Aware Routing Approach using ANN Technique with Data Fusion in WSN: Review

Since WSN having a limitation of the limited battery life time and if the battery will die soon i.e. Network has a finite lifespan. The most famous issue facing network designers in wireless networks is to maximize network life. In wireless communication devices, due to resource constraints sensors evidence and delivery of reliable data is a difficult task. The motivation behind this study is t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017