Protecting Location Privacy against Traffic Analysis in Wireless Sensor Networks with LEACH Routing Protocol

Article Preview

Abstract:

Traffic analysis attacks are always adopted to threaten the safety of base station in a wireless sensor network (WSN) which uses LEACH routing protocol. Typical packet traffic in such a network may expose the pronounced patterns which would allow an adversary analyzing traffic to deduce the location of base station. The paper proposes two defending algorithms based on LEACH routing protocol to deal with these traffic analysis techniques and conceal the true traffic pattern. First, a Random Hot Spots Algorithm (RHSA) has been developed to randomly construct several communication areas with fake local high data to protect the base station of a WSN. Secondly, an Anonymous Communication Algorithm (ACA) is proposed to hide identities of all nodes that participate in the process of packet transmission by generating pseudonyms dynamically. Simulation results show that RHSA and ACA can effectively deceive and misdirect the adversary, and protect the location of a base station against attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1233-1240

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xi Luo, Xu Ji, Myong-Soon Park, Location privacy against Traffic Analysis Attacks in Wireless Sensor Networks, In Proc. International Conference on Information Science and Applications (ICISA), (2010).

DOI: 10.1109/icisa.2010.5480564

Google Scholar

[2] Li Xunbo, Li Na, Chen Liang, Shen Yan, Wang Zhenlin, Zhu Zhibin, An Improved LEACH For Clustering Protocols In Wireless Sensor Networks, In Proc. 2010 International Conference on Measuring Technology and Mechatronics Automation, (2010).

DOI: 10.1109/icmtma.2010.710

Google Scholar

[3] J. Deng, R. Han and S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, In Proc. Conference on Security and Privacy in Communication Networks(SecureComm), (2005).

DOI: 10.1109/securecomm.2005.16

Google Scholar

[4] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, Enhancing source-location privacy in sensor network routing, In Proc. 25th IEEE International Conference on Distributed Computing System(ICDCS), (2005).

DOI: 10.1109/icdcs.2005.31

Google Scholar

[5] C. E Perkins and E.M. Royer, Preserving source location privacy in monitoring-based wireless sensor networks, In Proc. 2nd International Workshop on Security in Systems and Networks (SSN), In conjunction with IPDPS, (2006).

Google Scholar

[6] M. Reed, P. Syverson and D. Goldschlag, Anonymous connections and onion routing, IEEE J. Select. Areas Commun. vol. 16, No. 4: 482-494, May (1998).

DOI: 10.1109/49.668972

Google Scholar

[7] J.M. Kahn, R.H. Katz and K.S.J. Pister, Next century challenges: mobile networking for smart dust, In Proc. 5th Annual International Conference on Mobile Computing and Networking (MobiCom), (1999).

DOI: 10.1145/313451.313558

Google Scholar

[8] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, A Novel Scheme for Protecting Receiver's Location Privacy in Wireless Sensor Networks, In Proc. IEEE Transaction on Wireless Communications, vol. 7, No. 10. October 2008.

DOI: 10.1109/t-wc.2008.070182

Google Scholar