Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing

  • Juan E. Tapiador
  • Mudhakar Srivatsa
  • John A. Clark
  • John A. McDermid
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6827)


We study optimal strategies to decorrelating traffic in tactical wireless sensor networks where the goal is hiding sensible information (e.g., communication patterns, nodes location) about ongoing operations implicitly contained in network flows. Contrarily to existing approaches based on heuristic arguments, in this work we pose the problem in a more formal way. In particular, we explore the problem of how to derive routing policies which minimize the path predictability whilst observing certain QoS restrictions. We show how deriving optimal routing strategies can be couched as a nonlinear optimization problem with linear constraints. A convenient reformulation allows us to attack it very efficiently with a numerical least square error solver. Overall, the resulting scheme is an adaptive multipath routing protocol which provides the optimal balance between uninformativeness of routing patterns and end-to-end communication costs.


Wireless sensor networks traffic analysis security-cost tradeoffs 


  1. 1.
    Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2, 159–186 (2006)CrossRefGoogle Scholar
  2. 2.
    Elmasry, G.F.: A comparative review of commercial vs. tactical wireless networks. IEEE Communications Magazine 48(10), 54–59 (2010)CrossRefGoogle Scholar
  3. 3.
    Gill, P.E., Murray, W., Wright, M.H.: Practical Optimization. Academic Press, London (1981)Google Scholar
  4. 4.
    Gill, P.E., Murray, W., Saunders, M.A., Wright, M.H.: Procedures for Optimization Problems with a Mixture of Bounds and General Linear Constraints. ACM Trans. Math. Software 10, 282–298 (1984)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Kamat, P., Zhang, Y.Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: ICDCS 2005, pp. 599–608 (2005)Google Scholar
  6. 6.
    Kong, J., Hong, X.: ANODR: Anonymous on demand routing protocol with untraceable routes for mobile ad-hoc networks. In: ACM MobiHoc 2003 (2003)Google Scholar
  7. 7.
    Kullback, S., Leibler, R.A.: On Information and Sufficiency. Annals of Mathematical Statistics 22(1), 79–86 (1951)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 1501–1514 (2009)CrossRefGoogle Scholar
  9. 9.
    Mehta, K., Liu, D.G., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: ICNP 2007, pp. 314–323 (2007)Google Scholar
  10. 10.
    Ngai, E.C.-H.: On providing sink anonymity for sensor networks. In: IWCMC 2009, pp. 269–273 (2009)Google Scholar
  11. 11.
    Optimization Toolbox User’s Guide, Version 5. The MathWorks, Inc. (2010)Google Scholar
  12. 12.
    Seys, S., Preneel, B.: ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks. Intl. J. Wireless and Mobile Computing 3(3), 145–155 (2009)CrossRefGoogle Scholar
  13. 13.
    Sound, G.I.: VoIP: Better than PSTN?,
  14. 14.
    Suri, N., Benincasa, G., Tortonesi, M., Stefanelli, C., Kovach, J., Winkler, R., Kohler, R., Hanna, J., Pochet, L., Watson, S.: Peer-to-peer communications for tactical environments: Observations, requirements, and experiences. IEEE Communications Magazine 48(10), 60–69 (2010)CrossRefGoogle Scholar
  15. 15.
    Tarique, M., Tepe, K.E., Adibi, S., Erfani, S.: Survey of multipath routing protocols for mobile ad hoc networks. J. Network and Computer Applications 32, 1125–1143 (2009)CrossRefGoogle Scholar
  16. 16.
    Tsirigos, A., Haas, Z.J.: Multipath Routing in the Presence of Frequent Topological Changes. IEEE Communications Magazine 39(11), 132–138 (2001)CrossRefGoogle Scholar
  17. 17.
    Xi, Y., Schwiebert, L., Shi, W.S.: Preserving source location privacy in monitoring-based wireless sensor networks. In: IPDPS 2006 (2006)Google Scholar
  18. 18.
    Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: WiSec 2008, pp. 77–88 (2008)Google Scholar
  19. 19.
    Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: INFOCOM 2005 (2005)Google Scholar
  20. 20.
    Zhu, B., Wan, Z., Kankanhalli, M., Bao, F., Deng, R.: Anonymous secure routing in mobile ad-hoc networks. In: LCN 2004, pp. 102–108 (2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Juan E. Tapiador
    • 1
  • Mudhakar Srivatsa
    • 2
  • John A. Clark
    • 1
  • John A. McDermid
    • 1
  1. 1.Department of Computer ScienceUniversity of YorkYorkUK
  2. 2.IBM Thomas J. Watson Research CenterUSA

Personalised recommendations