MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks

  • Tommy Chin
  • Kaiqi Xiong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9798)


This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay.


Wireless Sensor Network Moving Target Defense Security 



We acknowledge the National Science Foundation (NSF) to partially sponsor this research under grants #1633978, #1620871, #1303382, #1431265, and BBN/GPO project #1936 through NSF/CNS grant. We would like to thank Pieter Becue, Brecht Vermeulen, Vincent Sercu, and Bart Jooris for their diligent work in maintaining and supporting the w-iLab.t testbed that has made possible to conduct the real-world experiments in this paper. Additionally, we would like to thank the members of Winlab at Rutgers University for maintaining the Orbit Lab testbed. Lastly, the views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of the NSF.


  1. 1.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)CrossRefGoogle Scholar
  2. 2.
    Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Netw. 8(8), 791–809 (2010)CrossRefGoogle Scholar
  3. 3.
    Deng, J., Han, R., Mishra, S.: Insens: intrusion-tolerant routing for wireless sensor networks. Comput. Commun. 29(2), 216–230 (2006)CrossRefGoogle Scholar
  4. 4.
    Zhu, W.T., Zhou, J., Deng, R.H., Bao, F.: Detecting node replication attacks in wireless sensor networks: a survey. J. Netw. Comput. Appl. 35(3), 1022–1034 (2012)CrossRefGoogle Scholar
  5. 5.
    Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)CrossRefGoogle Scholar
  6. 6.
    Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: Geni: a federated testbed for innovative network experiments. Comput. Netw. 61, 5–23 (2014). Special issue on Future Internet Testbeds Part ICrossRefGoogle Scholar
  7. 7.
    Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., Siracusa, R., Liu, H., Singh, M.: Overview of the orbit radio grid testbed for evaluation of next-generation wireless network protocols. In: IEEE Wireless Communications and Networking Conference, vol. 3, pp. 1664–1669. IEEE (2005)Google Scholar
  8. 8.
    Bouckaert, S., Vandenberghe, W., Jooris, B., Moerman, I., Demeester, P.: The w-iLab.t testbed. In: Magedanz, T., Gavras, A., Thanh, N.H., Chase, J.S. (eds.) TridentCom 2010. LNICST, vol. 46, pp. 145–154. Springer, Heidelberg (2011)Google Scholar
  9. 9.
    Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)CrossRefGoogle Scholar
  10. 10.
    Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey, Rensselaer Polytechnic Institute, Troy, New York, pp. 5–7. Technical Report (2005)Google Scholar
  11. 11.
    Omar, M., Challal, Y., Bouabdallah, A.: Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28(3), 199–214 (2009)CrossRefGoogle Scholar
  12. 12.
    Chin, T., Xiong, K., Blasch, E.: Nonlinear target tracking for threat detection using rssi and optical fusion. In: 18th International Conference on Information Fusion (Fusion), pp. 1946–1953, July 2015Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Computing SecurityRochester Institute of TechnologyRochesterUSA
  2. 2.Florida Cyber Security CenterUniversity of South FloridaTampaUSA

Personalised recommendations