About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

Research Article

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECURECOMM.2005.16,
        author={ Jing  Deng and S.  Mishra and R. Han},
        title={Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks},
        proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2006},
        month={3},
        keywords={},
        doi={10.1109/SECURECOMM.2005.16}
    }
    
  • Jing Deng
    S. Mishra
    R. Han
    Year: 2006
    Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECURECOMM.2005.16
Jing Deng1, S. Mishra1, R. Han1
  • 1: University of Colorado at Boulder

Abstract

Wireless sensor networks are highly vulnerable to the failure of base stations. An adversary can render a wireless sensor network useless by launching remote, softwarebased attacks or physical attacks on the base stations. This paper addresses the problem of defending a base station against physical attacks by concealing the geographic location of a base station. Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. The paper investigates several countermeasures against traffic analysis techniques aimed at disguising the location of a base station. First, a degree of randomness is introduced in the multi-hop path a packet takes from a sensor node to a base station. Second, random fake paths are introduced to confuse an adversary from tracking a packet as it moves towards a base station. Finally, multiple, random areas of high communication activity are created to deceive an adversary as to the true location of the base station. The paper evaluates these techniques analytically and via simulation using three evaluation criteria: total entropy of the network, total energy consumed, and the ability to guard against heuristic-based techniques to locate a base station.

Published
2006-03-20
Publisher
IEEE
http://dx.doi.org/10.1109/SECURECOMM.2005.16
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL