Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks

نویسندگان

  • Zhong Ren
  • Mohamed F. Younis
چکیده

Wireless Sensor Networks (WSNs) often serve mission-critical applications in hostile environments and may be thus a subject to attacks. Since the sensor data are collected at in situ base-station (BS), an adversary can inflict the maximal damage to a WSN by pinpointing the BS. In this paper, we propose three novel approaches for boosting the anonymity of the BS nodes to protect them from potential threats. We first explore the deployment of multiple BS nodes and provide guidelines on a cost versus anonymity trade-off to determine the most suitable BS count for a network. Second, we exploit the mobility of BS nodes and categorise the effect of relocating some of the existing BS nodes to the lowest anonymity regions. Finally, we pursue dynamic sensor to cluster re-association in order to change the traffic pattern and confuse the adversary. The effectiveness of the proposed approaches is validated through simulation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the security and reliability of wireless sensor networks based on an effective algorithm for boosting base station anonymity

Wireless sensor networks (WSNs) have shown great potential for serving a full spectrum of applications in a wide variety of environments. Of special interests are applications that operate in hostile setups such as combat zones and territorial border. These applications are categorized with the presence of adversaries who are eager to attack the network. The most effective approach for an adver...

متن کامل

A Novel Approach for Boosting Base Station Anonymity in a WSN

Nodes in a wireless sensor network scrutinize the nearby region and transmit their findings to the base station (BS) using multi-hop transmission. As the BS plays an important role in a wireless sensor network, therefore an adversary who wants to interrupt the operation of the network would avidly look for the BS location and imposes maximum damage by destroying the BS physically. The multi-hop...

متن کامل

An efficient anonymous communication protocol for wireless sensor networks

Anonymous communication is very important for many wireless sensor networks, because it can be used to hide the identity of important nodes, such as the base station and a source node. In sensor networks, anonymous communication includes several important aspects, such as source anonymity, communication-relationship anonymity, and base station anonymity. Existing sensor network anonymous scheme...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

An Artificial Bee Colony Inspired Clustering Solution to Prolong Lifetime of Wireless Sensor Networks

It is very difficult and expensive to replace sensor node battery in wireless sensor network in many critical conditions such as bridge supervising, resource exploration in hostile locations, and wildlife safety, etc. The natural choice in such situations is to maximize network lifetime. One such approach is to divide the sensing area of wireless sensor network into clusters to achieve high ene...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSNet

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2012