A Novel Approach for Boosting Base Station Anonymity in a WSN
نویسندگان
چکیده
Nodes in a wireless sensor network scrutinize the nearby region and transmit their findings to the base station (BS) using multi-hop transmission. As the BS plays an important role in a wireless sensor network, therefore an adversary who wants to interrupt the operation of the network would avidly look for the BS location and imposes maximum damage by destroying the BS physically. The multi-hop data transmission towards BS makes a prominent pattern of the traffic (huge traffic near the BS region) that indicates the presence of BS in the nearby region and thus the location of the BS may expose to the adversaries. This work aims to provide a novel approach which will increase the BS anonymity. For this purpose, a randomly roamed BS and the special nodes are proposed to achieve the above mentioned objective. The special nodes produce a large number of high traffic regions, which are similar to the BS region. Now, there are many regions which look like BS region and hence the probability to get the BS region using traffic analysis is very low. Therefore, this approach increases the effort of adversaries in order to find the exact BS position. We have used a standard entropy model to measure the anonymity of the base station and the GSAT test is used to calculate the number of steps required to find the base station. The results show that the proposed technique provides better results in terms of anonymity compared to the existing techniques. Keywords—Anonymity; network lifetime; wireless sensor networks
منابع مشابه
Improving the security and reliability of wireless sensor networks based on an effective algorithm for boosting base station anonymity
Wireless sensor networks (WSNs) have shown great potential for serving a full spectrum of applications in a wide variety of environments. Of special interests are applications that operate in hostile setups such as combat zones and territorial border. These applications are categorized with the presence of adversaries who are eager to attack the network. The most effective approach for an adver...
متن کاملExploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
Wireless Sensor Networks (WSNs) often serve mission-critical applications in hostile environments and may be thus a subject to attacks. Since the sensor data are collected at in situ base-station (BS), an adversary can inflict the maximal damage to a WSN by pinpointing the BS. In this paper, we propose three novel approaches for boosting the anonymity of the BS nodes to protect them from potent...
متن کاملBase Station Controlled Intelligent Clustering Routing in Wireless Sensor Networks
The main constrains for Wireless Sensor Network (WSN) are its limited energy and bandwidth. In industry, WSN deployed with massive node density produces lots of sensory traffic with redundancy. Accordingly, it decreases the network lifetime. In our proposed approach, we investigate the problem on energy-efficient routing for a WSN in a radio harsh environment. We propose a novel approach to cre...
متن کاملA New Method for Clustering Wireless Sensor Networks to Improve the Energy Consumption
Clustering is an effective approach for managing nodes in Wireless Sensor Network (WSN). A new method of clustering mechanism with using Binary Gravitational Search Algorithm (BGSA) in WSN, is proposed in this paper to improve the energy consumption of the sensor nodes. Reducing the energy consumption of sensors in WSNs is the objective of this paper that is through selecting the sub optimum se...
متن کاملA Novel Energy Aware Routing Approach using ANN Technique with Data Fusion in WSN: Review
Since WSN having a limitation of the limited battery life time and if the battery will die soon i.e. Network has a finite lifespan. The most famous issue facing network designers in wireless networks is to maximize network life. In wireless communication devices, due to resource constraints sensors evidence and delivery of reliable data is a difficult task. The motivation behind this study is t...
متن کامل