APCAPT: Asymmetric power control against packet tracer attacks for base station location anonymity

Base Station location anonymity is a critical aspect while securing a Wireless Sensor Network (WSN) against local adversarial attacks. WSNs have a wide range of applications where security is a primary concern. Among different security issues, the area of base station (BS) location privacy has been relatively less explored. In this paper, we propose a novel technique to protect the location privacy of the BS against external packet tracer attacks by employing asymmetric power control for the transmissions along the multi hop path between the source and the sink. The transmission range at each sensor node is varied with the objective of minimizing the amount of distance the packet tracer can travel towards the sink, thereby preventing the attacker from tracing packets directly to the BS. We formulate this as an optimization problem and derive the optimal transmission levels for the routing paths to the BS based on our utility that minimizes the mobility of the local adversary. We evaluate the level of security provided by our scheme and measure the overhead involved in terms of additional energy consumed in the network.

[1]  Edith C. H. Ngai On providing sink anonymity for sensor networks , 2009, IWCMC.

[2]  Ming Gu,et al.  Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[3]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[4]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[5]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[6]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[7]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[8]  Dharma P. Agrawal,et al.  Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[9]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[10]  Honglong Chen,et al.  From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.

[11]  Bülent Tavli,et al.  Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks , 2010, IEEE Communications Letters.

[12]  Dharma P. Agrawal,et al.  Lifetime optimization of Wireless Sensor Networks with packet propagation table , 2012, 2012 IEEE International Conference on Communications (ICC).

[13]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..