Energy Efficient Technique for Concealing Sink Location in WSN (original) (raw)
Related papers
Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2011
For sensor networks deployed to collect and transmit events into a sink node, sink anonymity is a critical security property. Traditional encryption and authentication are not effective in terms of preserving the sink's location because attackers can determine its location through traffic analysis. In this paper, we propose an easy to implement Concealing of the Sink Location (CSL) technique, which is based on the use of fake message injection. CSL is able to prevent attackers from acquiring valuable information on the sink's location through the traffic analysis attack. Simulation results demonstrate clearly that CSL protocol can hide effectively the sink's location. Although using fake messages consumes additional energy, the network's lifetime is not impacted, as will be shown.
Anti-traffic analysis attack for location privacy in WSNs
EURASIP Journal on Wireless Communications and Networking, 2014
Traditional encryption and authentication methods are not effective in preserving a sink's location privacy from a global adversary that is monitoring the network traffic. In this paper, we first propose a novel anti-traffic analysis (ATA) method to preserve the sink's location privacy. In order to confuse a local or global adversary, each node generates dummy messages, the number of which is dependent on the number of the node's children. Hence, ATA is able to prevent the adversary from acquiring valuable information on the sink's location through the traffic analysis attack. However, a larger number of dummy messages lead to consumption of extra energy. Then, we design our improved ATA (IATA) in such a way that we select some sensors to act as fake sinks, to ensure that sensors around fake sinks generate dummy messages and discard received dummy messages. Since the problem of the optimal fake sinks' placement is nondeterministic polynomial time (NP)-hard, we employ local search heuristics based on network traffic and security entropy. Performance analysis of the ATA scheme can protect the sink's location privacy, and IATA scheme can reduce energy consumption.
AN ENHANCING SECURITY FOR MOBILE SINKS BY PROVIDING LOCATION PRIVACY IN WSN
A huge collection of sensed data is transacted in Wireless Sensor Networks. This sensed data are reported to the sink. These sinks can be predefined data rendezvous points via multi hop communications. Basically WSNs (Wireless Sensor Networks) plays a key role in applications such as military, remote sensing, etc. Attackers may locate the sink easily by reading the destination field in the packet header or predicting the arrival of the sinks. Data are forwarded along random paths and stored at intermediate points. A random data collection scheme was used to protect the location privacy of mobile sinks in wireless sensor networks. By the sink will move randomly to collect data from local nodes. The goal of the system is to prevent the attackers from predicting their locations and movement of the sink is private. We also protect the sink by data collection at random time intervals and unequal visiting probability.
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN
International Journal of Computer Network and Information Security, 2012
Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.
Achieving sink node anonymity under energy constraints in tactical wireless sensor networks
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, 2015
A wireless sensor network (WSN) is a distributed network that facilitates wireless information gathering within a region of interest. The information collected by sensors is aggregated at a central node know as the sink node. Two challenges in the deployment of WSNs are limited battery power of each sensor node and sink node anonymity. The role played by the sink node raises its profile as a high value target for attack, thus its anonymity is crucial to the security of a WSN. In order to improve network security, we must implement a protocol that conceals the sink node's location while being cognizant of energy resource constraints. In this paper we develop a routing algorithm based on node clustering to improve sink node anonymity while simultaneously limiting node energy depletion. Via MATLAB simulations, we analyze the effectiveness of this algorithm in obfuscating the sink node's location in the WSN while preserving node energy. We show that the anonymity of the sink node is independent of traffic volume and that the average energy consumed by a node remains consistent across topological variations.
International Journal of Advance Engineering and Research Development, 2014
In recent years, Wireless Sensor Network has drawn considerable attention from research community due to wide range of applications used. The most notable challenge which is threatening the WSN is source location privacy. Preserving the source location means hiding the physical location of the source from the adversaries and increasing difficulty for adversaries in tracing the message path back to the source location. Although many of the privacy related schemes such as Phantom routing has been established, still there exists problem with source location privacy. This paper focuses on one solution namely Tree-based Diversionary Routing scheme. The main goal of Tree based diversionary routing is to improve performance in two aspects: privacy and network lifetime. The idea behind Tree-based Diversionary Routing scheme is to create diversionary routes along the path from source to sink and at the end of each route, Fake node is present. This increases difficulty for adversaries in tracing the path and identifying the source node. At the same time, Network Lifetime is also maximized by minimizing the energy consumption in hotspot region and utilizing that energy in creating the diversionary routes in non-hotspot region. The Directed oriented attack which leads the adversaries to identify source node easily can also be avoided.
IJERT-Securing the Location Privacy in wireless Sensor Networks
International Journal of Engineering Research and Technology (IJERT), 2013
https://www.ijert.org/securing-the-location-privacy-in-wireless-sensor-networks https://www.ijert.org/research/securing-the-location-privacy-in-wireless-sensor-networks-IJERTV2IS1398.pdf Wireless sensor network is composed of small low cost resource constrained sensor nodes (motes).There are many issues in wireless sensor networks. The two main issues are energy conservation and location privacy, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. In existing techniques like source simulation and backbone flooding techniques are impossible when the node is compromised by the global eavesdropper. These techniques are implemented to solve privacy issues only in homogeneous WSNs where all sensor nodes have same capabilities. So we present a packet altering scheme, which has lesser overhead compared to a source simulation or backbone flooding. This paper aims to maintain source and sink privacy under eavesdropping and node compromise attacks. The majority of the above mentioned efforts attempt to solve privacy issues in heterogeneous WSNs where all sensor nodes have different Capabilities.
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
Lecture Notes in Computer Science, 2012
The singular communication model in wireless sensor networks (WSNs) originate pronounced traffic patterns that allow a local observer to deduce the location of the base station, which must be kept secret for both strategical and security reasons. In this work we present a new receiver-location privacy solution called HISP (Homogenous Injection for Sink Privacy). Our scheme is based on the idea of hiding the flow of real traffic by carefully injecting fake traffic to homogenize the transmissions from a node to its neighbors. This process is guided by a lightweight probabilistic approach ensuring that the adversary cannot decide with sufficient precision in which direction to move while maintaining a moderate amount of fake traffic. Our system is both validated analytically and experimentally through simulations.
Providing Source and Sink Location Privacy against a Global Eavesdropper in Sensor Networks
International Journal of Research, 2014
Many of the protocols used to provide sensor network security, provide confidentiality for the content of the messages but contextual information usually remains exposed. Such contextual information can be misused by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques protect the leakage of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the global eavesdropper, is realistic and can overthrow these existing techniques.