Forming a cluster-mesh topology to boost base-station anonymity in wireless sensor networks

Wireless sensor networks (WSNs) may consist of a large number of resource-constrained sensor nodes. These nodes probe their surroundings and transmit their measurements over multi-hop routes to an in-situ Base-Station (BS). Given the critical role of the BS, it can be targeted by an adversary's attack. Basically, the adversary may intercept transmissions made by the individual nodes, even without being able to decode them, and apply techniques, such as Evidence Theory (ET), to uncover the routing topology. The fact that the BS is a sink for all data traffic makes it possible for the traffic analysis to reveal the location of the BS. This paper proposes a novel cross-layer approach to boost the BS anonymity by forming clusters and a cluster-mesh routing topology. Basically, a set of sensor nodes in a WSN are grouped into non-overlapping clusters, each is led by a cluster head (CH). A CH aggregates data from its cluster members. A mesh topology is then formed for all CHs and BS for dissemination of the aggregated data. The BS participates in the inter-CH packet forwarding so that it does not become distinguishable among the CHs. The simulation results confirm the effectiveness of the proposed approach.

[1]  Mohamed F. Younis,et al.  On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor Networks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[2]  Amitava Datta,et al.  Energy-Efficient Communication Protocols for Wireless Networks , 2003, ICOIN.

[3]  M. Mehdi Afsar,et al.  Clustering in sensor networks: A literature survey , 2014, J. Netw. Comput. Appl..

[4]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[5]  Jayme Luiz Szwarcfiter,et al.  Hamilton Paths in Grid Graphs , 1982, SIAM J. Comput..

[6]  Mohamed F. Younis,et al.  Providing location anonymity in a multi-base station wireless sensor network , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Mohamed F. Younis,et al.  Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[8]  J. Monnot,et al.  The Traveling Salesman Problem and its Variations , 2014 .

[9]  Bülent Yener,et al.  On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.

[10]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[11]  Jehn-Ruey Jiang,et al.  An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks , 2011, J. Inf. Sci. Eng..

[12]  W. Marsden I and J , 2012 .

[13]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  Ronald L. Rivest,et al.  Introduction to Algorithms, third edition , 2009 .

[15]  Yuh-Ren Tsai,et al.  Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability , 2011, IEEE Journal on Selected Areas in Communications.

[16]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[17]  Klara Nahrstedt,et al.  Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks , 2006, DCOSS.

[18]  Dijiang Huang On Measuring Anonymity For Wireless Mobile Ad-hoc Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[19]  Adel Youssef,et al.  Salam: a Scalable Anchor-Free localization Algorithm for Wireless Sensor Networks , 2006 .

[20]  Christopher Umans,et al.  Hamiltonian cycles in solid grid graphs , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[21]  Mohamed F. Younis,et al.  Increasing Transmission Power for Higher Base-Station Anonymity in Wireless Sensor Network , 2011, 2011 IEEE International Conference on Communications (ICC).

[22]  Gerald L. Thompson,et al.  Hamiltonian Tours and Paths in Rectangular Lattice Graphs , 1977 .

[23]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[24]  Bart Preneel,et al.  ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[25]  Mohamed F. Younis,et al.  Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.

[26]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[27]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[28]  Mohamed F. Younis,et al.  Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.