Sink Location Protection Protocols Based on Packet Sending Rate Adjustment

Sink location protection is critical to the viability of sensor networks as the central point of failure. Most existing work related to sink location protection focuses on local traffic analysis attack. In this paper, we study the sink location protection problem under a more powerful type of attack, the global traffic analysis attack. In order to hide the sink location, a protocol based on packet sending rate adjustment (SRA) is proposed. By controlling the packet sending rate of each node according to the current number of source nodes, SRA conceals the real traffic volume generated by source nodes and hence disguises the location of the sink. For further reducing the communication cost, we propose a light weight SRA protocol (L-SRA), which protects the sink location while significantly decreasing the communication cost. Performance of both SRA and L-SRA has been validated by theoretical analysis and simulation results.

[1]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[2]  Honglong Chen,et al.  On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..

[3]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  Dimitrios Makrakis,et al.  Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Mohamed F. Younis,et al.  Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.

[6]  Mohamed F. Younis,et al.  Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[7]  Mohamed F. Younis,et al.  Increasing base station anonymity using distributed beamforming , 2015, Ad Hoc Networks.

[8]  Ming Gu,et al.  Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[9]  Shivakant Mishra,et al.  Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..

[10]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2009, MSWiM '09.

[11]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[12]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Shivakant Mishra,et al.  Enhancing Base Station Security in Wireless Sensor Networks , 2003 .

[14]  Elisa Bertino,et al.  Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information , 2006, MSN.