FMSLPP: fake-message based sink location privacy preservation for WSNs against global eavesdroppers

Abstract Traditional encryption and authentication methods are not effective in preserving sink’s location privacy from a global adversary that could be monitoring the network’s traffic and time-of-arrival of traffic flows. In this paper, we present a novel method named fake-message based sink location privacy preservation (FMSLPP) to protect sink’s location privacy against global eavesdroppers. In this method, we let sensors generate fake messages with a probability before the sink sends a message, in order to confuse an adversary about the sink’s location. We also make each node have approximately the same traffic volume to protect the sink’s location privacy. Simulation results from two approaches of sensor deployment (random deployment or controlled deployment) indicate that FMSLPP makes it very difficult for the global adversary to identify the location of the sink; at the same time, transmission of fake messages does not impact significantly the network’s performance in terms of network life. Graphical Abstract Our protocol’s principle

[1]  Jianbo Yao,et al.  Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks , 2010, 2010 2nd International Workshop on Database Technology and Applications.

[2]  Mingyan Liu,et al.  Controlled Flooding Search in a Large Network , 2007, IEEE/ACM Transactions on Networking.

[3]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[4]  Bülent Tavli,et al.  Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability , 2011, IEEE Communications Letters.

[5]  Ioannis Stavrakakis,et al.  Performance Analysis of Probabilistic Flooding Using Random Graphs , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[6]  Chin-Tser Huang,et al.  PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers , 2013, 2013 Proceedings IEEE INFOCOM.

[7]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[8]  Mohamed F. Younis,et al.  Increasing Transmission Power for Higher Base-Station Anonymity in Wireless Sensor Network , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  N. V. S. N. Sarma,et al.  AES based secure low energy adaptive clustering hierarchy for WSNs , 2013, Other Conferences.

[11]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[12]  Mohamed F. Younis,et al.  Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[13]  Honglong Chen,et al.  From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.

[14]  Ming Gu,et al.  Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[15]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[17]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[18]  Wenyuan Xu,et al.  Zeroing-in on network metric minima for sink location determination , 2010, WiSec '10.

[19]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[20]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[21]  Massoud Pedram,et al.  QoM and lifetime-constrained random deployment of sensor networks for minimum energy consumption , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[22]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[23]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[24]  Dimitrios Makrakis,et al.  Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[25]  Mohamed F. Younis,et al.  Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.

[26]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[27]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[28]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[29]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[30]  G. Häusler,et al.  Laser triangulation: fundamental uncertainty in distance measurement. , 1994, Applied optics.

[31]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[32]  Dimitrios Makrakis,et al.  Anonymous topology discovery for multihop wireless sensor networks , 2007, Q2SWinet '07.

[33]  Elisa Bertino,et al.  Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information , 2006, MSN.

[34]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.