Skip to main content

A Hierarchical Anonymous Communication Protocol for Sensor Networks

  • Conference paper
Embedded and Ubiquitous Computing – EUC 2005 (EUC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3824))

Included in the following conference series:

Abstract

Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversaries. We quantify the anonymity strength of our protocol by introducing a new anonymity metric: Degree of Exposure Index. Our protocol is designed to offer flexible tradeoffs between degree of anonymity and communication-delay overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  2. Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (2000)

    Google Scholar 

  3. Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private Internet connections. Communications of the ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  4. Beimel, A., Dolev, S.: Buses for anonymous message delivery. In: Second International Conference on FUN with Algorithms, Elba, Italy, May 2001, pp. 1–13. Carleton Scientific (2001)

    Google Scholar 

  5. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)

    Google Scholar 

  6. Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proceedings of WMASH (2003)

    Google Scholar 

  7. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proceedings of the International Conference of Distributed Computing Systems, ICDCS (2002)

    Google Scholar 

  8. Smailagic, A., Siewiorek, D.P., Anhalt, J., Kogan, D., Wang, Y.: Location Sensing and Privacy in a Context Aware Computing Environment. Pervasive Computing (2001)

    Google Scholar 

  9. Jackson, I.W.: Anonymous Addresses and Confidentiality of Location. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)

    Google Scholar 

  10. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems (January 1992)

    Google Scholar 

  11. http://www.zeroknowledge.com

  12. Boucher, P., Goldberg, I., Shostack, A.: Freedom System 2.0 Architecture. Zero-Knowledge Systems Inc. white paper (December 2000)

    Google Scholar 

  13. Kong, J., Hong, X.: ANODR: ANonymous on Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In: Proceedings of MobiHoc (2003)

    Google Scholar 

  14. Bandyopadhyay, S., Coyle, E.J.: An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), San Francisco, CA, March 30 - April 3 (2003)

    Google Scholar 

  15. Chiasserini, C.F., Chlamtac, I., Monti, P., Nucci, A.: Energy Efficient design of Wireless Ad Hoc Networks. In: Proceedings of European Wireless (February 2002)

    Google Scholar 

  16. Younis, O., Fahmy, S.: Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. In: Proceedings of IEEE INFOCOM, March 2004, vol. 1, pp. 629–640 (2004)

    Google Scholar 

  17. Younis, O., Fahmy, S.: HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks. IEEE Transactions on Mobile Computing 3(4), 366–379 (2004)

    Article  Google Scholar 

  18. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001 (July 2001)

    Google Scholar 

  19. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of IEEE INFOCOM 2004 (March 2004)

    Google Scholar 

  20. Díaz, C., Preneel, B.: Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 309–325. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Callaway Jr., E.H.: Wireless Sensor Networks: Architectures and Protocols. Auerbach Publications (an imprint of CRC Press), New York (2003)

    Book  Google Scholar 

  22. Leon-Garcia, A., Widjaja, I.: Communication Networks: Fundamental Concepts and Key Architectures. McGraw Hill, New York (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Durresi, A., Paruchuri, V., Durresi, M., Barolli, L. (2005). A Hierarchical Anonymous Communication Protocol for Sensor Networks. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds) Embedded and Ubiquitous Computing – EUC 2005. EUC 2005. Lecture Notes in Computer Science, vol 3824. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596356_111

Download citation

  • DOI: https://doi.org/10.1007/11596356_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30807-2

  • Online ISBN: 978-3-540-32295-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics