Skip to main content

Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks

  • Conference paper
Distributed Computing in Sensor Systems (DCOSS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4026))

Included in the following conference series:

Abstract

When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryption is used to protect the actual contents of the messages. The communication patterns, which often reveal higher volumes of traffic near the sink, could allow an attacker to identify the vicinity of the sink node. With this information, an attacker could potentially disable the network by destroying the sink. In this paper, we present the decoy sink protocol, which protects the location of the sink in target tracking sensor network applications by forwarding data to a decoy sink for aggregation before the aggregated data is forwarded to the real sink from the decoy sink. Combining indirection and data aggregation in our protocol creates more traffic away from the sink and reduces the amount of traffic near the sink, which makes traffic analysis more difficult for attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., Culler, D.: An analysis of a large scale habitat monitoring application. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)

    Google Scholar 

  2. Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based countersniper system. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)

    Google Scholar 

  3. Aslam, J., Butler, Z., Constantin, F., Crespi, V., Cybenko, G., Rus, D.: Tracking a moving object with a binary sensor network. In: 1st ACM Conference on Embedded Networked Sensor Systems (2003)

    Google Scholar 

  4. Hwang, I., Balakrishnan, H., Roy, K., Shin, J., Guibas, L., Tomlin, C.: Multiple-target tracking and identity management. In: 2nd IEEE International Conference on Sensors (2003)

    Google Scholar 

  5. Gu, L., Jia, D., Vicaire, P., Yan, T., Luo, L., Tirumala, A., Cao, Q., He, T., Stankovic, J., Abdelzaher, T., Krogh, B.: Lightweight detection and classification for wireless sensor networks in realistic environments. In: 3rd ACM Conference on Embedded Networked Sensor Systems (2005)

    Google Scholar 

  6. Abdelzaher, T., Blum, B., Cao, Q., Chen, Y., Evans, D., George, J., George, S., Gu, L., He, T., Krishnamurthy, S., Luo, L., Son, S., Stankovic, J., Stoleru, R., Wood, A.: EnviroTrack: towards an environmental computing paradigm for distributed sensor networks. In: 24th International Conference on Distributed Computing Systems (2004)

    Google Scholar 

  7. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.-S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with Zebranet. In: 2nd International Conference on Mobile Systems, Applications, and Services (2004)

    Google Scholar 

  8. Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: The International Conference on Dependable Systems and Networks (2004)

    Google Scholar 

  9. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)

    Google Scholar 

  10. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. In: 7th International Conference on Mobile Computing and Networking (2001)

    Google Scholar 

  11. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)

    Google Scholar 

  12. Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Chang Shantz, S.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. In: 3rd IEEE International Conference on Pervasive Computing and Communications (2005)

    Google Scholar 

  13. Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications (1998)

    Google Scholar 

  14. Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: a distributed anonymous information storage and retrieval system. In: International Workshop on Design Issues in Anonymity and Unobservability (2000)

    Google Scholar 

  15. Fu, X., Graham, B., Bettati, R., Zhao, W.: On effectiveness of link padding for statistical traffic analysis attacks. In: 23rd International Conference on Distributed Computing Systems (2003)

    Google Scholar 

  16. Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)

    Google Scholar 

  17. Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)

    Google Scholar 

  18. Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: 5th Symposium on Operating Systems Design and Implementation (2002)

    Google Scholar 

  19. Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems 30(1) (2005)

    Google Scholar 

  20. He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: 9th International Conference on Mobile Computing and Networking (2003)

    Google Scholar 

  21. Chan, H., Luk, M., Perrig, A.: Using clustering information for sensor network localization. In: International Conference on Distributed Computing in Sensor Systems (2005)

    Google Scholar 

  22. Moore, D., Leonard, J., Rus, D., Teller, S.: Robust distributed network localization with noisy range measurements. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)

    Google Scholar 

  23. Kim, S., Fonseca, R., Culler, D.: Reliable transfer on wireless sensor networks. In: 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (2004)

    Google Scholar 

  24. Institute for Software Integrated Systems at Vanderbilt University. JProwler, http://www.isis.vanderbilt.edu/projects/nest/jprowler/

  25. Crossbow. MICA2 Datasheet, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf

  26. Crossbow. MICAz Datasheet, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf

  27. Maroti, M., Kusy, B., Simon, G., Ledeczi, A.: The flooding time synchronization protocol. In: 2nd ACM Conference on Embedded Networked Sensor Systems (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Conner, W., Abdelzaher, T., Nahrstedt, K. (2006). Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds) Distributed Computing in Sensor Systems. DCOSS 2006. Lecture Notes in Computer Science, vol 4026. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11776178_13

Download citation

  • DOI: https://doi.org/10.1007/11776178_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35227-3

  • Online ISBN: 978-3-540-35228-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics