skip to main content
10.1145/1582379.1582439acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

On providing sink anonymity for sensor networks

Published: 21 June 2009 Publication History

Abstract

The sinks usually in sensor networks usually broadcast their addresses for data collection. However, this common operation opens up vulnerability for adversary to attack the sinks and obstruct their normal functions. In this paper, we suggest sink anonymity as a novel approach for data collection, which protects the privacy of the sinks and avoids them to become the target of attacks. We provide sink anonymity by omitting the address of the sinks in routing, so that the identity and location of the sinks are kept private. Our proposed scheme, Randomized Routing with Hidden Address (RRHA), prevents the attackers from obtaining the receiver address by capturing the destination field of the packets or by predicting the location of the sinks by observing the flow of network traffic. We examined the successful delivery rate, packet delay, and protection strength of our proposed scheme by both analysis and simulations.

References

[1]
J. N. Al-Karaki and A. E. Kamal. Routing techniques in wireless sensor networks: a survey. Elsevier Ad Hoc Networks Journal, pages 325--349, 2005.
[2]
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi. Routing through the mist: privacy preserving communication in ubiquitous computing environment. In Proc. of IEEE ICDCS, 2002.
[3]
J. Deng, R. Han, and S. Mishra. Countermeasures against trafic analysis attacks in wireless sensor networks. In Proc. of IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005.
[4]
S. C. Ergen and P. Varaiya. Energy efficient routing with delay guarantee for sensor networks. ACM Wireless Networks, 13(5):679--690, Oct 2007.
[5]
L. Eschenaur and V. Gligor. A key-management scheme for distributed sensor networks. In Proc. of the 9th ACM Conference on Computer and Communication Security, 2002.
[6]
K. Fall and K. Varadhan. The ns manual, Dec 2003. http://www.isi.edu/nsnam/ns.
[7]
E. Felemban, C.-G. Lee, and E. Ekici. MMSPEED: multipath multi-speed protocol for QoS guarantee of reliability and timeliness in wireless sensor networks. IEEE Trans. on Mobile Computing, 5(6):738--754, Jun 2006.
[8]
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile computing and communication review, 1(2), 2001.
[9]
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor netwroks. In Proc. of USENIX Workshop on Hot Topics in Operation Systems (HotOS IX), 2003.
[10]
T. He, J. Stankovic, C. Lu, and T. Abdelzaher. SPEED: a real-time routing protocol for sensor networks. In Proc. of IEEE ICDCS, pages 46--55, Providence, RI, U.S., May 2003.
[11]
Y. Jian, S. Chen, Z. Zhang, and L. Zhang. Protecting receiver-location privacy in wireless sensor networks. In Proc. of IEEE Infocom, pages 1955--1963, 2007.
[12]
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In Proc. of IEEE ICDCS, Columbus, Ohio, USA, Jun 2005.
[13]
B. Karp and H. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Proc. of ACM Mobicom, Boston, Massachusetts, U.S., 2000.
[14]
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson. Wireless sensor networks for habitat monitoring. In WSNA '02: Proc. of the 1st ACM international workshop on Wireless sensor networks and applications, pages 88--97, New York, NY, USA, 2002. ACM.
[15]
E. C.-H. Ngai, Y. Zhou, M. R. Lyu, and J. Liu. Reliable reporting of delay-sensitive events in wireless sensor-actuator networks. In Proc. of IEEE MASS, Vancouver, Canada, Oct 2006.
[16]
A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Cullar. Spins: security protocols for sensor networks. Wireless Communications, 8(5):521--534, 2002.
[17]
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In Proc. of IEEE Infocom, 2008.
[18]
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In Proc. of ACM WiSec, Alexandria, Virginia, USA, Apr 2008.
[19]
W. Zhang, G. Cao, and T. L. Porta. Data dissemination with ring-based index for wireless sensor networks. IEEE Transactions on Mobile Computing, 6(7):832--847, 2007.

Cited By

View all
  • (2018)SCOUTThe Journal of Supercomputing10.5555/3288339.328835574:10(5022-5040)Online publication date: 1-Oct-2018
  • (2018)SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networksThe Journal of Supercomputing10.1007/s11227-018-2346-174:10(5022-5040)Online publication date: 3-Apr-2018
  • (2017)Sink location privacy protection under direction attack in wireless sensor networksWireless Networks10.1007/s11276-015-1179-623:2(579-591)Online publication date: 1-Feb-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
June 2009
1561 pages
ISBN:9781605585697
DOI:10.1145/1582379
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data collection
  2. privacy
  3. sensor networks
  4. wireless communications

Qualifiers

  • Research-article

Conference

IWCMC '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)SCOUTThe Journal of Supercomputing10.5555/3288339.328835574:10(5022-5040)Online publication date: 1-Oct-2018
  • (2018)SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networksThe Journal of Supercomputing10.1007/s11227-018-2346-174:10(5022-5040)Online publication date: 3-Apr-2018
  • (2017)Sink location privacy protection under direction attack in wireless sensor networksWireless Networks10.1007/s11276-015-1179-623:2(579-591)Online publication date: 1-Feb-2017
  • (2016)On providing sink anonymity for wireless sensor networksSecurity and Communication Networks10.1002/sec.2459:2(77-86)Online publication date: 25-Jan-2016
  • (2015)Tactics for providing location privacy against global adversaries in wireless sensor networks2015 International Conference on Computer, Communication and Control (IC4)10.1109/IC4.2015.7375686(1-5)Online publication date: Sep-2015
  • (2014)An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks2014 Fourth International Conference on Communication Systems and Network Technologies10.1109/CSNT.2014.157(748-751)Online publication date: Apr-2014
  • (2013)Toward a Statistical Framework for Source Anonymity in Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2011.26712:2(248-260)Online publication date: 1-Feb-2013
  • (2013)Providing Source Location Privacy in Wireless Sensor Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/SURV.2013.011413.0011815:3(1238-1280)Online publication date: Nov-2014
  • (2013)Protecting the sink location privacy in wireless sensor networksPersonal and Ubiquitous Computing10.1007/s00779-012-0539-917:5(883-893)Online publication date: 1-Jun-2013
  • (2012)Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks2012 IEEE International Conference on Communications (ICC)10.1109/ICC.2012.6364762(6705-6709)Online publication date: Jun-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media