scholarly journals Anti-traffic analysis attack for location privacy in WSNs

Author(s):  
Bi Di Ying ◽  
Dimitrios Makrakis ◽  
Hussein T Mouftah

In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink’s location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet. The simulation results prove that EESLP can improve network life time and QOS (congestion, throughput, packet delivery rate) of sensor network while protecting sinks Location privacy.


2018 ◽  
Vol 78 (21) ◽  
pp. 29731-29745
Author(s):  
Alejandra Guadalupe Silva Trujillo ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba ◽  
Tai-Hoon Kim

Author(s):  
Chitra Rajarama ◽  
Jagadeesha Narasimhamurthy Sugatoor ◽  
Yerri Swamy T

<span>A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.</span>


2014 ◽  
Vol 513-517 ◽  
pp. 1233-1240
Author(s):  
Yu Mei Wang ◽  
Xun Xue Cui ◽  
Xi Hui Fan

Traffic analysis attacks are always adopted to threaten the safety of base station in a wireless sensor network (WSN) which uses LEACH routing protocol. Typical packet traffic in such a network may expose the pronounced patterns which would allow an adversary analyzing traffic to deduce the location of base station. The paper proposes two defending algorithms based on LEACH routing protocol to deal with these traffic analysis techniques and conceal the true traffic pattern. First, a Random Hot Spots Algorithm (RHSA) has been developed to randomly construct several communication areas with fake local high data to protect the base station of a WSN. Secondly, an Anonymous Communication Algorithm (ACA) is proposed to hide identities of all nodes that participate in the process of packet transmission by generating pseudonyms dynamically. Simulation results show that RHSA and ACA can effectively deceive and misdirect the adversary, and protect the location of a base station against attacks.


Author(s):  
Chitra Rajarama ◽  
Jagadeesha Narasimhamurthy Sugatoor ◽  
Yerri Swamy T

A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.


Sign in / Sign up

Export Citation Format

Share Document