MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks

Base station (BS) location privacy has been widely studied and researched in different applications like field monitoring, agriculture, industry and military etc. The purpose is to hide the location of BS from outside/inside attacker in any shape. Hundreds of thousands of sensor nodes are deployed in some area, bring lot of new challenges regarding routing, forwarding, scaling and security. Different approaches are there to provide location privacy in wireless sensor networks (WSN). The work done by researchers is to provide some form of BS location privacy either different from others or boosting them more. In our scheme, we proposed a new algorithm MimiBS “Mimicking Base-Station”. All the deployed aggregator nodes (ANs) in the field/area will be looking like BS, even if the attacker knows about any AN, he will be deceived between the real BS and AN. We approached different schemes for our proposed algorithm mentioning routing without fake packets, with fake packets, without energy consideration and with energy consideration. These different parameters show an improvement over previous work regarding the same problem.

[1]  Dharma P. Agrawal,et al.  Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[2]  Raju Dutta,et al.  Energy efficient modified SPIN protocol with high security in Wireless Sensor Networks using TOSSIM , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[3]  Giuseppe Anastasi,et al.  Performance measurements of motes sensor networks , 2004, MSWiM '04.

[4]  Jie Yang,et al.  Multi-lateral privacy-preserving localization in pervasive environments , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Panos M. Pardalos,et al.  Mathematical Aspects of Network Routing Optimization , 2011 .

[6]  Xu Ji,et al.  Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.

[7]  Rui Li,et al.  A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Nitin H. Vaidya,et al.  A new ‘Direction’ for source location privacy in wireless sensor networks' , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[9]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Luca Mottola,et al.  Programming wireless sensor networks , 2011, ACM Comput. Surv..

[11]  Dharma P. Agrawal,et al.  Multi-subnets selection and rate allocation in a heterogeneous wireless network , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[12]  Qinghua Li,et al.  Providing Efficient Privacy-Aware Incentives for Mobile Sensing , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[13]  Qiaoyan Wen,et al.  Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.

[14]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[15]  Jaydeep Barad,et al.  DIST-LEACH: A deterministic key management scheme for securing cluster-based sensor networks , 2014, 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).

[16]  S. Jayanthi,et al.  KRUPTO: Supporting privacy against location dependent attacks in wireless sensor network , 2013, 2013 International Conference on Communication and Signal Processing.

[17]  Anne-Marie Kermarrec,et al.  Lightweight probabilistic broadcast , 2003, TOCS.

[18]  Zhongming Zheng,et al.  ERCD: An energy-efficient clone detection protocol in WSNs , 2013, 2013 Proceedings IEEE INFOCOM.

[19]  Dimitrios Makrakis,et al.  Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[20]  Xi Chen,et al.  Mutual privacy-preserving regression modeling in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[21]  Qian Zhang,et al.  A stochastic game for privacy preserving context sensing on mobile phone , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[22]  Javier López,et al.  Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..

[23]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[24]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[25]  Xiaodong Lin,et al.  FINE: A fine-grained privacy-preserving location-based service framework for mobile devices , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[26]  Mohamed F. Younis,et al.  Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[27]  Tongtong Li,et al.  Providing source privacy in mobile ad hoc networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[28]  Hui Li,et al.  EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[29]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[30]  Wenyuan Xu,et al.  Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[31]  Guihai Chen,et al.  SLICER: A Slicing-Based K-Anonymous Privacy Preserving Scheme for Participatory Sensing , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[32]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[33]  Jianying Zhou,et al.  Wireless Sensor Network Security , 2008 .

[34]  Shortest Path Problem , 2002 .

[35]  Ahmad Khonsari,et al.  Rate-privacy in wireless sensor networks , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[36]  V. C. Sekhar,et al.  Security in Wireless sensor networks with public key techniques , 2012, 2012 International Conference on Computer Communication and Informatics.

[37]  Honglong Chen,et al.  From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.

[38]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[39]  H. T. Mouftah,et al.  A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.