Abstract
When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryption is used to protect the actual contents of the messages. The communication patterns, which often reveal higher volumes of traffic near the sink, could allow an attacker to identify the vicinity of the sink node. With this information, an attacker could potentially disable the network by destroying the sink. In this paper, we present the decoy sink protocol, which protects the location of the sink in target tracking sensor network applications by forwarding data to a decoy sink for aggregation before the aggregated data is forwarded to the real sink from the decoy sink. Combining indirection and data aggregation in our protocol creates more traffic away from the sink and reduces the amount of traffic near the sink, which makes traffic analysis more difficult for attackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., Culler, D.: An analysis of a large scale habitat monitoring application. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)
Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based countersniper system. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)
Aslam, J., Butler, Z., Constantin, F., Crespi, V., Cybenko, G., Rus, D.: Tracking a moving object with a binary sensor network. In: 1st ACM Conference on Embedded Networked Sensor Systems (2003)
Hwang, I., Balakrishnan, H., Roy, K., Shin, J., Guibas, L., Tomlin, C.: Multiple-target tracking and identity management. In: 2nd IEEE International Conference on Sensors (2003)
Gu, L., Jia, D., Vicaire, P., Yan, T., Luo, L., Tirumala, A., Cao, Q., He, T., Stankovic, J., Abdelzaher, T., Krogh, B.: Lightweight detection and classification for wireless sensor networks in realistic environments. In: 3rd ACM Conference on Embedded Networked Sensor Systems (2005)
Abdelzaher, T., Blum, B., Cao, Q., Chen, Y., Evans, D., George, J., George, S., Gu, L., He, T., Krishnamurthy, S., Luo, L., Son, S., Stankovic, J., Stoleru, R., Wood, A.: EnviroTrack: towards an environmental computing paradigm for distributed sensor networks. In: 24th International Conference on Distributed Computing Systems (2004)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.-S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with Zebranet. In: 2nd International Conference on Mobile Systems, Applications, and Services (2004)
Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: The International Conference on Dependable Systems and Networks (2004)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. In: 7th International Conference on Mobile Computing and Networking (2001)
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)
Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Chang Shantz, S.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. In: 3rd IEEE International Conference on Pervasive Computing and Communications (2005)
Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications (1998)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: a distributed anonymous information storage and retrieval system. In: International Workshop on Design Issues in Anonymity and Unobservability (2000)
Fu, X., Graham, B., Bettati, R., Zhao, W.: On effectiveness of link padding for statistical traffic analysis attacks. In: 23rd International Conference on Distributed Computing Systems (2003)
Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)
Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: 5th Symposium on Operating Systems Design and Implementation (2002)
Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems 30(1) (2005)
He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: 9th International Conference on Mobile Computing and Networking (2003)
Chan, H., Luk, M., Perrig, A.: Using clustering information for sensor network localization. In: International Conference on Distributed Computing in Sensor Systems (2005)
Moore, D., Leonard, J., Rus, D., Teller, S.: Robust distributed network localization with noisy range measurements. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)
Kim, S., Fonseca, R., Culler, D.: Reliable transfer on wireless sensor networks. In: 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (2004)
Institute for Software Integrated Systems at Vanderbilt University. JProwler, http://www.isis.vanderbilt.edu/projects/nest/jprowler/
Crossbow. MICA2 Datasheet, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf
Crossbow. MICAz Datasheet, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf
Maroti, M., Kusy, B., Simon, G., Ledeczi, A.: The flooding time synchronization protocol. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Conner, W., Abdelzaher, T., Nahrstedt, K. (2006). Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds) Distributed Computing in Sensor Systems. DCOSS 2006. Lecture Notes in Computer Science, vol 4026. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11776178_13
Download citation
DOI: https://doi.org/10.1007/11776178_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35227-3
Online ISBN: 978-3-540-35228-0
eBook Packages: Computer ScienceComputer Science (R0)