Abstract
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversaries. We quantify the anonymity strength of our protocol by introducing a new anonymity metric: Degree of Exposure Index. Our protocol is designed to offer flexible tradeoffs between degree of anonymity and communication-delay overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (2000)
Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private Internet connections. Communications of the ACM 42(2), 39–41 (1999)
Beimel, A., Dolev, S.: Buses for anonymous message delivery. In: Second International Conference on FUN with Algorithms, Elba, Italy, May 2001, pp. 1–13. Carleton Scientific (2001)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)
Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proceedings of WMASH (2003)
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proceedings of the International Conference of Distributed Computing Systems, ICDCS (2002)
Smailagic, A., Siewiorek, D.P., Anhalt, J., Kogan, D., Wang, Y.: Location Sensing and Privacy in a Context Aware Computing Environment. Pervasive Computing (2001)
Jackson, I.W.: Anonymous Addresses and Confidentiality of Location. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems (January 1992)
Boucher, P., Goldberg, I., Shostack, A.: Freedom System 2.0 Architecture. Zero-Knowledge Systems Inc. white paper (December 2000)
Kong, J., Hong, X.: ANODR: ANonymous on Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In: Proceedings of MobiHoc (2003)
Bandyopadhyay, S., Coyle, E.J.: An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), San Francisco, CA, March 30 - April 3 (2003)
Chiasserini, C.F., Chlamtac, I., Monti, P., Nucci, A.: Energy Efficient design of Wireless Ad Hoc Networks. In: Proceedings of European Wireless (February 2002)
Younis, O., Fahmy, S.: Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. In: Proceedings of IEEE INFOCOM, March 2004, vol. 1, pp. 629–640 (2004)
Younis, O., Fahmy, S.: HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks. IEEE Transactions on Mobile Computing 3(4), 366–379 (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001 (July 2001)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of IEEE INFOCOM 2004 (March 2004)
Díaz, C., Preneel, B.: Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 309–325. Springer, Heidelberg (2004)
Callaway Jr., E.H.: Wireless Sensor Networks: Architectures and Protocols. Auerbach Publications (an imprint of CRC Press), New York (2003)
Leon-Garcia, A., Widjaja, I.: Communication Networks: Fundamental Concepts and Key Architectures. McGraw Hill, New York (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Durresi, A., Paruchuri, V., Durresi, M., Barolli, L. (2005). A Hierarchical Anonymous Communication Protocol for Sensor Networks. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds) Embedded and Ubiquitous Computing – EUC 2005. EUC 2005. Lecture Notes in Computer Science, vol 3824. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596356_111
Download citation
DOI: https://doi.org/10.1007/11596356_111
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30807-2
Online ISBN: 978-3-540-32295-5
eBook Packages: Computer ScienceComputer Science (R0)