Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
نویسندگان
چکیده
Wireless Sensor Networks (WSNs) often serve mission-critical applications in hostile environments and may be thus a subject to attacks. Since the sensor data are collected at in situ base-station (BS), an adversary can inflict the maximal damage to a WSN by pinpointing the BS. In this paper, we propose three novel approaches for boosting the anonymity of the BS nodes to protect them from potential threats. We first explore the deployment of multiple BS nodes and provide guidelines on a cost versus anonymity trade-off to determine the most suitable BS count for a network. Second, we exploit the mobility of BS nodes and categorise the effect of relocating some of the existing BS nodes to the lowest anonymity regions. Finally, we pursue dynamic sensor to cluster re-association in order to change the traffic pattern and confuse the adversary. The effectiveness of the proposed approaches is validated through simulation.
منابع مشابه
Improving the security and reliability of wireless sensor networks based on an effective algorithm for boosting base station anonymity
Wireless sensor networks (WSNs) have shown great potential for serving a full spectrum of applications in a wide variety of environments. Of special interests are applications that operate in hostile setups such as combat zones and territorial border. These applications are categorized with the presence of adversaries who are eager to attack the network. The most effective approach for an adver...
متن کاملA Novel Approach for Boosting Base Station Anonymity in a WSN
Nodes in a wireless sensor network scrutinize the nearby region and transmit their findings to the base station (BS) using multi-hop transmission. As the BS plays an important role in a wireless sensor network, therefore an adversary who wants to interrupt the operation of the network would avidly look for the BS location and imposes maximum damage by destroying the BS physically. The multi-hop...
متن کاملAn efficient anonymous communication protocol for wireless sensor networks
Anonymous communication is very important for many wireless sensor networks, because it can be used to hide the identity of important nodes, such as the base station and a source node. In sensor networks, anonymous communication includes several important aspects, such as source anonymity, communication-relationship anonymity, and base station anonymity. Existing sensor network anonymous scheme...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn Artificial Bee Colony Inspired Clustering Solution to Prolong Lifetime of Wireless Sensor Networks
It is very difficult and expensive to replace sensor node battery in wireless sensor network in many critical conditions such as bridge supervising, resource exploration in hostile locations, and wildlife safety, etc. The natural choice in such situations is to maximize network lifetime. One such approach is to divide the sensing area of wireless sensor network into clusters to achieve high ene...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJSNet
دوره 11 شماره
صفحات -
تاریخ انتشار 2012