2006
DOI: 10.1016/j.pmcj.2005.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks

Abstract: Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, the base station can be destroyed, rendering the entire sensor network inoperative, since a base station is a central point of data collection and hence failure. This paper investigates a suite of decorrelation countermeasures aimed at disguising the location of a base station against traffic analysis attacks. A set of basic counterme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
89
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(89 citation statements)
references
References 18 publications
(20 reference statements)
0
89
0
Order By: Relevance
“…Taking the problem of non-conforming behavior further, it is possible to imagine that an adversarial network would deliberately take action to frustrate the estimation problem, as pointed out in [8]. However, we conjecture that any such action would degrade the performance of the adversarial network.…”
Section: B Discussionmentioning
confidence: 92%
See 1 more Smart Citation
“…Taking the problem of non-conforming behavior further, it is possible to imagine that an adversarial network would deliberately take action to frustrate the estimation problem, as pointed out in [8]. However, we conjecture that any such action would degrade the performance of the adversarial network.…”
Section: B Discussionmentioning
confidence: 92%
“…This approach was previously taken in [8], which was mostly concerned with identifying a base station (which we refer to as a data sink). Other approaches can be taken, such as observing the total data rate through each node, with the largest data rate most likely corresponding to the data sink [9].…”
Section: Introductionmentioning
confidence: 99%
“…Different techniques [26,27] are proposed to counter the traffic analysis attacks. The rate monitoring attack can be partially prevented by the multiple parents routing technique since traffic spreads along multiple paths.…”
Section: Location Privacy For Base Stationmentioning
confidence: 99%
“…Concealed Data Aggregation (CDA) (Ferrer. (2002)) is a type of PH scheme, which conceals the process of data aggregation in WSN by using Domingo-Ferrer's (DF) approach ( Deng, et al (2006)). In this protocol, each sensor node splits its data into d parts (d ≥ 2), encrypts them by using a public key and transmits them to the aggregator node.…”
Section: Fig 4 Smc Scheme Illustrationmentioning
confidence: 99%