Skip to main content
Erschienen in: Wireless Networks 2/2017

04.01.2016

Sink location privacy protection under direction attack in wireless sensor networks

verfasst von: Jian Wang, Fengyu Wang, Zhenzhong Cao, Fengbo Lin, Jiayan Wu

Erschienen in: Wireless Networks | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks have been widely deployed in military and civilian applications. Due to the nature of the sensor network, it is easy for an adversary to trace the movement of packets and get the sink location. Many ways have been proposed to deal with this problem, most of them provide path diversity. But these techniques always expose direction information. Once adversaries have got the direction information, they can launch a direction attack by deducing the direction of the sink and choosing right paths to trace. To cope with the direction attack, we present an improved scheme based on injecting fake packets and random walk of real packets. In this scheme, real packets do a random walk to hide direction information at a special phase, fake packets are injected in intersection nodes of two or more shortest paths, which can lead adversaries to fake paths. Privacy analysis shows that our scheme has a good performance on protecting sink location. We also examine the delivery time, energy consumption and safe time by simulations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cordeiro, C., & Agrawal, D. (2011). Ad hoc & sensor networks: Theory and applications. Singapore: World Scientific Publishing Company.CrossRef Cordeiro, C., & Agrawal, D. (2011). Ad hoc & sensor networks: Theory and applications. Singapore: World Scientific Publishing Company.CrossRef
2.
Zurück zum Zitat Pandit, V., Jung, H. J., & Agrawal, D.P. (2011). Inherent security benefits of analog network coding for the detection of byzantine attacks in multi-hop wireless networks. In Proceedings of IEEE international conference on mobile ad-hoc and sensor systems (MASS), pp. 697–702. Pandit, V., Jung, H. J., & Agrawal, D.P. (2011). Inherent security benefits of analog network coding for the detection of byzantine attacks in multi-hop wireless networks. In Proceedings of IEEE international conference on mobile ad-hoc and sensor systems (MASS), pp. 697–702.
3.
Zurück zum Zitat Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source location privacy in sensor network routing. In Proceedings of international conference on distributed computing systems (ICDCS), pp. 599–608. Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source location privacy in sensor network routing. In Proceedings of international conference on distributed computing systems (ICDCS), pp. 599–608.
4.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In Proceedings of international conference on security and privacy for emerging areas in communications networks (SecureComm), pp. 113–126. Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In Proceedings of international conference on security and privacy for emerging areas in communications networks (SecureComm), pp. 113–126.
5.
Zurück zum Zitat Yao, L., Kang, L., Shang, P. F., & Wu, G. W. (2013). Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 17(5), 883–893.CrossRef Yao, L., Kang, L., Shang, P. F., & Wu, G. W. (2013). Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 17(5), 883–893.CrossRef
6.
Zurück zum Zitat Spreitzer, M., & Theimer, M. (1993). Providing location information in a ubiquitous computing environment. In Proceedings of the 14th ACM symposium on operating system principles (SOSP), pp. 270–283. Spreitzer, M., & Theimer, M. (1993). Providing location information in a ubiquitous computing environment. In Proceedings of the 14th ACM symposium on operating system principles (SOSP), pp. 270–283.
7.
Zurück zum Zitat Hoh, B., & Gruteser, M. (2005). Protecting location privacy through path confusion. In Proceedings of international conference on security and privacy for emerging areas in communications networks(SecureComm), pp. 194–205. Hoh, B., & Gruteser, M. (2005). Protecting location privacy through path confusion. In Proceedings of international conference on security and privacy for emerging areas in communications networks(SecureComm), pp. 194–205.
8.
Zurück zum Zitat Al-Muhtadi, J., Campbell, B., Kapadia, A., Mickunas, M., & Yi, S. (2002). Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedings of international conference on distributed computing systems (ICDCS), pp. 74–83. Al-Muhtadi, J., Campbell, B., Kapadia, A., Mickunas, M., & Yi, S. (2002). Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedings of international conference on distributed computing systems (ICDCS), pp. 74–83.
9.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor. In Proceedings of international conference on dependable systems and networks (DSN), pp. 637–646. Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor. In Proceedings of international conference on dependable systems and networks (DSN), pp. 637–646.
10.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2006). Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, 2(2), 159–186.CrossRef Deng, J., Han, R., & Mishra, S. (2006). Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, 2(2), 159–186.CrossRef
11.
Zurück zum Zitat Jian, Y., Chen, S. G., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In Proceedings of IEEE international conference on computer communications (INFOCOM), pp. 1955–1963. Jian, Y., Chen, S. G., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In Proceedings of IEEE international conference on computer communications (INFOCOM), pp. 1955–1963.
12.
Zurück zum Zitat Ngai, E. C. -H. (2009). On providing sink anonymity for sensor networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (IWCMC), pp. 269–273. Ngai, E. C. -H. (2009). On providing sink anonymity for sensor networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (IWCMC), pp. 269–273.
13.
Zurück zum Zitat Li, X. F., Wang, X. Y., Zheng, N., Wan, Z. G., & Gu, M. (2009). Enhanced location privacy protection of base station in wireless sensor networks. In Proceedings of international conference on mobile ad-hoc and sensor networks (MSN), pp. 457–464. Li, X. F., Wang, X. Y., Zheng, N., Wan, Z. G., & Gu, M. (2009). Enhanced location privacy protection of base station in wireless sensor networks. In Proceedings of international conference on mobile ad-hoc and sensor networks (MSN), pp. 457–464.
14.
Zurück zum Zitat Ebrahimi, Y., & Younis, M. (2011). Using deceptive packets to increase base-station anonymity in wireless sensor network. In Proceedings of the 2011 international conference on wireless communications and mobile computing (IWCMC), pp. 842–847. Ebrahimi, Y., & Younis, M. (2011). Using deceptive packets to increase base-station anonymity in wireless sensor network. In Proceedings of the 2011 international conference on wireless communications and mobile computing (IWCMC), pp. 842–847.
15.
Zurück zum Zitat Ying, B. D., Makrakis, D., & Mouftah, H. T. (2014). Anti-traffic analysis attack for location privacy in WSNs. EURASIP Journal on Wireless Communications and Networking, 1, 131. Ying, B. D., Makrakis, D., & Mouftah, H. T. (2014). Anti-traffic analysis attack for location privacy in WSNs. EURASIP Journal on Wireless Communications and Networking, 1, 131.
16.
Zurück zum Zitat Gottumukkala, V. P. V., Pandit, V., Li, H., & Agrawal, D. P. (2010). Base station location anonymity and security technique for wireless sensor networks. In Proceedings of IEEE international conference on communications (ICC), pp. 6705–6709. Gottumukkala, V. P. V., Pandit, V., Li, H., & Agrawal, D. P. (2010). Base station location anonymity and security technique for wireless sensor networks. In Proceedings of IEEE international conference on communications (ICC), pp. 6705–6709.
17.
Zurück zum Zitat Chen, H. L., & Lou, W. (2012). From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. In Proceedings of IEEE international performance computing and communications conference (IPCCC), pp. 1–8. Chen, H. L., & Lou, W. (2012). From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. In Proceedings of IEEE international performance computing and communications conference (IPCCC), pp. 1–8.
18.
Zurück zum Zitat Liu, Z. H., & Xu, W. Y. (2012). Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks, 18(3), 335–349.CrossRef Liu, Z. H., & Xu, W. Y. (2012). Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks, 18(3), 335–349.CrossRef
19.
Zurück zum Zitat Ghafoor, S., Rehmani, M. H., Cho, S., & Park, S. H. (2014). An efficient trajectory design for mobile sink in a wireless sensor network. Elsevier Computers and Electrical Engineering Journal, 40(7), 2089–2100.CrossRef Ghafoor, S., Rehmani, M. H., Cho, S., & Park, S. H. (2014). An efficient trajectory design for mobile sink in a wireless sensor network. Elsevier Computers and Electrical Engineering Journal, 40(7), 2089–2100.CrossRef
20.
Zurück zum Zitat Papadimitriou, A., Fessant, F. L., Viana, A. C., & Sengul, C. (2009). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Proceedings of IEEE international conference on network protocols (ICNP). Papadimitriou, A., Fessant, F. L., Viana, A. C., & Sengul, C. (2009). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Proceedings of IEEE international conference on network protocols (ICNP).
21.
Zurück zum Zitat Viana, A. C., Ziviani, A., & Friedman, R. (2009). Decoupling data dissemination from mobile sink’s trajectory in wireless sensor networks. IEEE Communications Letters, 13(3), 178–180.CrossRef Viana, A. C., Ziviani, A., & Friedman, R. (2009). Decoupling data dissemination from mobile sink’s trajectory in wireless sensor networks. IEEE Communications Letters, 13(3), 178–180.CrossRef
Metadaten
Titel
Sink location privacy protection under direction attack in wireless sensor networks
verfasst von
Jian Wang
Fengyu Wang
Zhenzhong Cao
Fengbo Lin
Jiayan Wu
Publikationsdatum
04.01.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1179-6

Weitere Artikel der Ausgabe 2/2017

Wireless Networks 2/2017 Zur Ausgabe

Neuer Inhalt