Advertisement

Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks

  • Shan Chang
  • Yong Qi
  • Hongzi Zhu
  • Mianxiong Dong
  • Kaoru Ota
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6843)

Abstract

In wireless sensor networks (WSNs), sinks or base stations are the key nodes of the networks which receive and process data from sensor nodes, hence their location should be protected well. However, they can easy fall prey to attacks launched by adversaries. In this paper, we propose a novel countermeasure Maelstrom to protect the location privacy of the key nodes in WSNs from both traffic analysis and packet tracing attacks. The basic idea of Maelstrom is to pre-assign several maelstrom areas in a network, which serve as the destinations of fake packets generated by sensor nodes. We also propose an Approximate Shortest Routing protocol (ASR) for packet delivery. Combining ASR with maelstroms congregated by fake packets, an adversary who launches both traffic analysis and packet tracing attack will be thwarted. The simulation results show that, compared with LPR combined with fake packet injection, under similar energy cost, Maelstrom can remarkably enhance the security of receiver-location in WSNs.

Keywords

receiver-location privacy traffic analysis attacks packet tracing attacks wireless sensor networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceeding of SecureComm 2005, Athens, Greece (September 2005)Google Scholar
  3. 3.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceeding of ICDCS 2005, Columbus, USA (June 2005)Google Scholar
  4. 4.
    Zhang, L.: A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. In: Proceeding of IWCMC 2006, New York, USA (July 2006)Google Scholar
  5. 5.
    Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. on Wireless Communications 7(10) (October 2008)Google Scholar
  6. 6.
    Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proceeding of WoWMoM 2006, Niagara, Canada (June 2006)Google Scholar
  7. 7.
    Mehta, K., Liu, D.: Location privacy in sensor networks against a global eavesdropper. In: Proceeding of ICNP 2007, Beijing, China (October 2007)Google Scholar
  8. 8.
    Fan, Y., Jiang, Y., Zhu, H., Chen, J., Shen, X.: Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. IEEE Trans. on Wireless Communications 10(3) (December 2010)Google Scholar
  9. 9.
    Zhu, Y., Bettati, R.: Compromising location privacy in wireless networks using sensors with limited information. In: Proceeding of ICDCS 2007, Toronto, Canada (June 2007)Google Scholar
  10. 10.
    Xi, Y., Schwiebert, L., Shim, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceeding of IPDPS 2006, Rhodes Island, Greece (April 2006)Google Scholar
  11. 11.
    Cheng, R., Yau, D.Y., Fu, J.: Packet cloaking: protecting receiver privacy against traffic analysis. In: Proceeding of NPSec 2007, Beijing, China (October 2007)Google Scholar
  12. 12.
    Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceeding of WSTFEUS 2004, Vienna, Austria (May 2004)Google Scholar
  13. 13.
    Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proceeding of SecureComm 2005, Athens, Greece (September 2005)Google Scholar
  14. 14.
    Ouyang, Y., Le, Z., Ford, J., Makedon, F.: PrivaSense: providing privacy protection for sensor networks. In: Proceeding of SenSys 2007, Sydney, Australia (November 2007)Google Scholar
  15. 15.
    Li, X., Wang, X., Zheng, N., Wan, Z., Gu, M.: Enhanced location pricacy protection of base station in wireless sensor networks. In: Proceeding of MSN 2009, Wu Yi Mountain, China (December 2009)Google Scholar
  16. 16.
    Chow, C., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. on Mobile Computing 10(1) (January 2011)Google Scholar
  17. 17.
    Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source Location Privacy: Analysis and Countermeasures. In: Proceeding of SecureComme 2009, Athens, Greece (September 2009)Google Scholar
  18. 18.
    Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., LaPorta, T.: Cross-layer enhanced source location privacy in sensor networks. In: Proceeding of SECON 2009, Rome, Italy (June 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Shan Chang
    • 1
  • Yong Qi
    • 1
  • Hongzi Zhu
    • 2
  • Mianxiong Dong
    • 2
  • Kaoru Ota
    • 2
  1. 1.Department of Computer Science and technologyXi’an Jiaotong UniversityXi’anChina
  2. 2.Department of Electrical and ComputerUniversity of WaterlooWaterlooCanada

Personalised recommendations