Anti-traffic analysis attack for location privacy in WSNs

Traditional encryption and authentication methods are not effective in preserving a sink's location privacy from a global adversary that is monitoring the network traffic. In this paper, we first propose a novel anti-traffic analysis (ATA) method to preserve the sink's location privacy. In order to confuse a local or global adversary, each node generates dummy messages, the number of which is dependent on the number of the node's children. Hence, ATA is able to prevent the adversary from acquiring valuable information on the sink's location through the traffic analysis attack. However, a larger number of dummy messages lead to consumption of extra energy. Then, we design our improved ATA (IATA) in such a way that we select some sensors to act as fake sinks, to ensure that sensors around fake sinks generate dummy messages and discard received dummy messages. Since the problem of the optimal fake sinks' placement is nondeterministic polynomial time (NP)-hard, we employ local search heuristics based on network traffic and security entropy. Performance analysis of the ATA scheme can protect the sink's location privacy, and IATA scheme can reduce energy consumption.

[1]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[2]  Ioannis Stavrakakis,et al.  Performance Analysis of Probabilistic Flooding Using Random Graphs , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[3]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[4]  A. Gurjar,et al.  Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[5]  Mohamed F. Younis,et al.  Using deceptive packets to increase base-station anonymity in wireless sensor network , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[6]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[7]  Chin-Tser Huang,et al.  PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[9]  Petros Spachos,et al.  Improving source-location privacy through opportunistic routing in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[10]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[11]  Nasser Yazdani,et al.  Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[12]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  Ehud D. Karnin,et al.  A Parallel Algorithm for the Knapsack Problem , 1984, IEEE Transactions on Computers.

[14]  Bart Preneel,et al.  Taxonomy of Mixes and Dummy Traffic , 2004, International Information Security Workshops.

[15]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Jianbo Yao,et al.  Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks , 2010, 2010 2nd International Workshop on Database Technology and Applications.

[17]  Albert Levi,et al.  Maintaining trajectory privacy in mobile wireless sensor networks , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[18]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[19]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[20]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[21]  Elisa Bertino,et al.  Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information , 2006, MSN.

[22]  Jie Wu,et al.  Providing hop-by-hop authentication and source privacy in wireless sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.

[23]  Jean Arlat,et al.  State of the Art Survey , 2022 .

[24]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[25]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[26]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[27]  Jian Ren,et al.  Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[28]  Mingyan Liu,et al.  Controlled Flooding Search in a Large Network , 2007, IEEE/ACM Transactions on Networking.

[29]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[30]  Bülent Tavli,et al.  Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability , 2011, IEEE Communications Letters.

[31]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[32]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..

[33]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[34]  Virginia Ann Johnson,et al.  State-of-the-art Survey , 2022 .

[35]  H. T. Mouftah,et al.  A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[36]  Honglong Chen,et al.  From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks , 2010, International Performance Computing and Communications Conference.

[37]  Qijun Gu,et al.  Sink-Anonymity Mobility Control in Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[38]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[39]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[40]  Lei Kang,et al.  Protecting Location Privacy in Large-Scale Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[41]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[42]  Mohamed F. Younis,et al.  Increasing Transmission Power for Higher Base-Station Anonymity in Wireless Sensor Network , 2011, 2011 IEEE International Conference on Communications (ICC).

[43]  Dimitrios Makrakis,et al.  Anonymous topology discovery for multihop wireless sensor networks , 2007, Q2SWinet '07.

[44]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[45]  S. Sivashankari,et al.  A framework of location privacy and minimum average communication under the global eaves dropper , 2013, 2013 International Conference on Current Trends in Engineering and Technology (ICCTET).

[46]  Dimitrios Makrakis,et al.  Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[47]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[48]  Mohamed F. Younis,et al.  Increasing base-station anonymity in wireless sensor networks , 2010, Ad Hoc Networks.

[49]  Ming Gu,et al.  Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[50]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).