On providing anonymity in wireless sensor networks

Securing wireless sensor networks against denial of service attacks that disrupt communications or target nodes serving key roles in the network, e.g. sinks or routers, is instrumental to network availability and performance. Particularly vulnerable to these attacks are the components of any communications or operation infrastructure in the network. In this paper, we address a class of wireless sensor networks where network protocols leverage a dynamic general-purpose virtual infrastructure; the core components of that infrastructure are a coordinate system, a cluster structure, and a routing structure. Since knowledge of this virtual infrastructure enables 'smart' cost-effective DOS attacks on the network, maintaining the anonymity of the virtual infrastructure is a primary security concern. The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the network virtual infrastructure. Specifically, our solution defines schemes for randomizing communications such that the coordinate system, cluster structure, and routing structure remain invisible to an external observer of network traffic during the setup phase of the network.

[1]  Yossi Matias,et al.  How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.

[2]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[3]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[4]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[5]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[6]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  Birgit Pfitzmann,et al.  Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..

[9]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[10]  Paul F. Syverson,et al.  Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.

[11]  Brian Neil Levine,et al.  Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[12]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[13]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[14]  Paul Saffo,et al.  Sensors: the next wave of innovation , 1997, CACM.

[15]  Andreas Pfitzmann,et al.  The Disadvantages of Free MIX Routes and how to Overcome Them , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[16]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[17]  Deborah Estrin,et al.  Data-centric storage in sensornets , 2003, CCRV.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .