Increasing base station anonymity using distributed beamforming
نویسندگان
چکیده
Advances in wireless communication technologies have enabled the networking of devices, which conventionally operated standalone, to form an Internet of Things (IoT). A typical network architecture consists of a set of data sources that report to a base station (BS), e.g., a data aggregation unit, over multi-hop paths. An example of such a network operation model includes surveillance of an unattended area using wireless sensor nodes, and advanced metering within a smart power grid. The unique role of the BS makes it a natural target for an adversary that desires to achieve the most impactful attack possible against an IoT network. Even if a network employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to exploit unique traffic patterns within the network and ultimately identify the BS. The first step to successfully protect the BS from attack is to keep the BS’s identity, role, and location anonymous. This paper proposes a novel, cross-layer approach that boosts BS anonymity using distributed beamforming. We demonstrate that the characteristics of distributed beamforming make it extremely effective in improving BS anonymity in a wireless network while minimizing the amount of required communication energy overhead. Through analysis and simulation we demonstrate that the proposed approach is both efficient and effective at countering an adversary that employs evidence theory analysis to locate the BS. 2015 Elsevier B.V. All rights reserved.
منابع مشابه
Stable Matching with Externalities for Beamforming and User Assignment in Multi-cell MISO Systems
We consider the problem of distributed joint user association and beamforming in multi-cell multiple-input singleoutput systems. Assuming perfect local channel state information, each base station applies a distributed beamforming scheme called WSLNR-MAX [1] which depends on the user association in the network. We determine the user association by a proposed stable matching with externalities a...
متن کاملImproving the security and reliability of wireless sensor networks based on an effective algorithm for boosting base station anonymity
Wireless sensor networks (WSNs) have shown great potential for serving a full spectrum of applications in a wide variety of environments. Of special interests are applications that operate in hostile setups such as combat zones and territorial border. These applications are categorized with the presence of adversaries who are eager to attack the network. The most effective approach for an adver...
متن کاملOptimum Beamforming Using Transmit Antenna Arrays
Transmit beamforming is a powerful means of increasing capacity in systems in which the transmitter is equipped with an antenna array, especially in systems in which receive beamforming is not available, as is typical in the base-to-mobile \downlink" in a cellular communication system. In this paper, the problem of transmit beamforming is formulated as one of minimizing the power radiated by th...
متن کاملSteerable Distributed Large-Aperture Audio Array Using Low-Power Wireless Acoustic Sensor Nodes
Recent advancements in low-power wireless communication technologies allow for rapid deployable embedded monitoring applications with a deployment lifetime of several weeks of months. In this work, we present a work-in-progress wireless audio streaming solution that uses a network of small wireless microphone arrays to form a distributed steerable large-aperture array. To keep the application’s...
متن کاملJoint Closed-Loop Power Control and Base Station Assignment for DS-CDMA Receiver in Multipath Fading Channel with Adaptive Beamforming Method
In this paper, we propose smart step closed-loop power control (SSPC) algorithm and base station assignment based on minimizing the transmitter power (BSAMTP) technique in a direct sequence-code division multiple access (DS-CDMA) receiver in the presence of frequency-selective Rayleigh fading. This receiver consists of three stages. In the first stage, with conjugate gradient (CG) adaptive ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc Networks
دوره 32 شماره
صفحات -
تاریخ انتشار 2015