Abstract
In recent years, wireless sensor networks (WSNs) have been attracting increased attention from the research and engineering communities, motivated by applications like security surveillance, border protection, combat field reconnaissance, environment and habitat monitoring, and target tracking. In these applications, a WSN typically consists of a large population of spatially distributed sensor nodes that cooperatively monitor conditions in their surroundings and report their findings to an in situ base station (BS). The BS not only collects and analyzes the incoming data, but also interfaces WSN to a higher authority. Hence, the unique role of the BS attracts adversary’s attention since it can be a single point of failure for WSN. In addition, in some applications such as target tracking, the node that detects and reports on an event could be of utmost importance for an intruder. An adversary that seeks to diminish the network utility can apply traffic analysis techniques to locate the sink of all packets (i.e., the BS) and/or the data sources in order to apply a denial of service attack, e.g., radio jamming. Countering such a threat necessitates enhanced BS and data source anonymity to conceal their identity, role, and location from external observers. This chapter analyzes the threat, highlights anonymity metrics, categorizes contemporary traffic analysis countermeasures, and discusses some of the emerging techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
21 ideas for the 21st century. Business Week, pp. 78–167 (1999)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Chong, C.Y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)
Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), pp. 113–126, Sept 2005. IEEE
Kong, J., Xiaoyan, H., Gerla, M.: An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Trans. Mob. Comput. 6(8), 888–902 (2007)
Venkitasubramaniam, P., He, T., Tong, L., Wicker, S.B.: Toward an analytical approach to anonymous wireless networking. IEEE Commun. Mag. 46(2), 140–146 (2008)
Qin, Y., Huang, D., Li, B.: STARS: a statistical traffic pattern discovery system for MANETs. IEEE Trans. Dependable Secure Comput. 11(2), 181–192 (2014)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: International Conference on Distributed Computing in Sensor Systems, pp. 202–217, June 2006. Springer Berlin Heidelberg
Ebrahimi, Y., Younis, M.: Averting in-situ adversaries in wireless sensor network using deceptive traffic. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, Dec 2011. IEEE
Li, X., Wang, X., Zheng, N., Wan, Z., Gu, M.: Enhanced location privacy protection of base station in wireless sensor networks. In: 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN’09), pp. 457–464, Dec 2009. IEEE
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)
Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Netw. 8(8), 791–809 (2010)
Bicakci, K., Bagci, I.E., Tavli, B.: Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Commun. Lett. 15(2), 205–207 (2011)
Ebrahimi, Y., Younis, M.: Increasing transmission power for higher base-station anonymity in wireless sensor network. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5, June 2011. IEEE
Ebrahimi, Y., Younis, M.: Using deceptive packets to increase base-station anonymity in wireless sensor network. In: 2011 7th International Wireless Communications and Mobile Computing Conference, pp. 842–847, July 2011. IEEE
Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the sink location in WSNs by artificially homogenizing traffic intensity. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 988–993, Apr 2011. IEEE
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: 2007 IEEE International Conference on Network Protocols, pp. 314–323, Oct 2007. IEEE
El-Badry, R., Younis, M.: Providing location anonymity in a multi-base station wireless sensor network. In: ICC, pp. 157–161, June 2012
Ward, J.R., Younis, M.: On the use of distributed relays to increase base station anonymity in wireless sensor networks. In: MILCOM 2012-2012 IEEE Military Communications Conference, pp. 1–6. IEEE
Ward, J.R., Younis, M.: On the use of distributed beamforming to increase base station anonymity in wireless sensor networks. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1–7, July 2013. IEEE
Di Ying, B., Makrakis, D., Mouftah, H.T.: Anti-traffic analysis attack for location privacy in WSNs. EURASIP J. Wirel. Commun. Netw. 2014(1), 1 (2014)
Baroutis, N., Younis, M.: Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 109–116, Oct 2015. IEEE
Baroutis, N., Younis, M.: Boosting base-station anonymity in wireless sensor networks through illusive multiple-sink traffic. In: 2016 IEEE Global Communications Conference (GLOBECOM 2016), Dec 2016. IEEE
Baroutis, N., Younis, M.: A Novel Traffic Analysis Attack Model and Base-station Anonymity Metrics for Wireless Sensor Networks. Security and Communication Networks (to appear)
Alsemairi, S., Younis, M.: Forming a cluster-mesh topology to boost base-station anonymity in wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), pp. 1–6, Apr 2016. IEEE
Alsemairi, S., Younis, M.: Clustering-based mitigation of anonymity attacks in wireless sensor networks. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–7, Dec 2015. IEEE
Alsemairi, S., Younis, M.: Adaptive packet-combining to counter traffic analysis in wireless sensor networks. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 337–342, Aug 2015. IEEE
Gottumukkala, V.P.V., Pandit, V., Li, H., Agrawal, D.P.: Base-station location anonymity and security technique (BLAST) for wireless sensor networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 6705–6709, June 2012. IEEE
Bangash, Y., Zeng, L., Feng, D.: MimiBS: mimicking base-station to provide location privacy protection in wireless sensor networks. In: 2015 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 158–166, Aug 2015. IEEE
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93, Oct 2004. ACM
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), pp. 599–608, June 2005. IEEE
Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, pp. 8, Apr 2006. IEEE
Mehta, K., Liu, D., Wright, M.: Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mob. Comput. 11(2), 320–336 (2012)
Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE
Chen, H., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: International Performance Computing and Communications Conference, pp. 1–8, Dec 2010. IEEE
Spachos, P., Song, L., Bui, F.M., Hatzinakos, D.: Improving source-location privacy through opportunistic routing in wireless sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 815–820, June 2011. IEEE
Lightfoot, L., Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor network using STaR routing. In: Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5, Dec 2010. IEEE
Gurjar, A., Patil, A.B.: Cluster based anonymization for source location privacy in wireless sensor network. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp. 248–251, Apr 2013. IEEE
Li, Y., Lightfoot, L., Ren, J.: Routing-based source-location privacy protection in wireless sensor networks. In: 2009 IEEE International Conference on Electro/Information Technology, pp. 29–34, June 2009. IEEE
Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Comput. Netw. 53(9), 1512–1529 (2009)
Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 23–34, June 2006. IEEE Computer Society
Kazatzopoulos, L., Delakouridis, C., Marias, G.F., Georgiadis, P.: ihide: Hiding sources of information in wsns. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’06), pp. 8, June 2006. IEEE
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 77–88, Mar 2008. ACM
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Toward a statistical framework for source anonymity in sensor networks. IEEE Trans. Mob. Comput. 12(2), 248–260 (2013)
Mahmoud, M.M., Shen, X.: A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(10), 1805–1818 (2012)
Bicakci, K., Gultekin, H., Tavli, B., Bagci, I.E.: Maximizing lifetime of event-unobservable wireless sensor networks. Comput. Stand. Interfaces 33(4), 401–410 (2011)
Yang, W., Zhu, W.T.: Protecting source location privacy in wireless sensor networks with data aggregation. In: International Conference on Ubiquitous Intelligence and Computing, pp. 252–266, Oct 2010. Springer Berlin Heidelberg
Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw. 1(1–2), 50–63 (2006)
Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2013)
Rahman, F., Hoque, E., Ahamed, S.I.: Preserving privacy in wireless sensor networks using reliable data aggregation. ACM SIGAPP Appl. Comput. Rev. 11(3), 52–62 (2011)
Ngai, E.C.H., Rodhe, I.: On providing location privacy for mobile sinks in wireless sensor networks. Wirel. Netw. 19(1), 115–130 (2013)
Oh, S., Gruteser, M.: Multi-node coordinated jamming for location privacy protection. In: 2011-MILCOM 2011 Military Communications Conference, pp. 1243–1249, Nov 2011. IEEE
Tavli, B., Ozciloglu, M.M., Bicakci, K.: Mitigation of compromising privacy by transmission range control in wireless sensor networks. IEEE Commun. Lett. 14(12), 1104–1106 (2010)
Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurth, S., La Porta, T.: Cross-layer enhanced source location privacy in sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE
Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology (2005)
Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 3(3), 145–155 (2009)
Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1940–1951, Mar 2005. IEEE
Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: A novel solution for achieving anonymity in wireless ad hoc networks. In: Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, pp. 30–38, Oct 2004. ACM
Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 15(3), 1238–1280 (2013)
Park, H., Song, S., Choi, B.Y., Huang, C.T.: Passages: preserving anonymity of sources and sinks against global eavesdroppers. In: INFOCOM, 2013 Proceedings IEEE, pp. 210–214, Apr 2013. IEEE
Li, X., Shi, H., Shang, Y.: A sorted RSSI quantization based algorithm for sensor network localization. In: 11th International Conference on Parallel and Distributed Systems (ICPADS’05), vol. 1, pp. 557–563, July 2005. IEEE
Yang, Y., Lee, J., Jung, J., Song, S., Yoon, H., Yoon, Y.: Target source detection using an improved sensing model in wireless sensor networks (ISMWSNs). In: 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5899–5902, Aug 2007. IEEE
Savvides, A., Han, C.C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 166–179, July 2001. ACM
Elnahrawy, E., Li, X., Martin, R.P.: The limits of localization using signal strength: a comparative study. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, pp. 406–414. IEEE
Bensky, A.: Wireless Positioning Technologies and Applications. Artech House (2016)
Chandrasekaran, G., Ergin, M.A., Yang, J., Liu, S., Chen, Y., Gruteser, M., Martin, R.P.: Empirical evaluation of the limits on localization using signal strength. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE
Selman, B., Levesque, H.J., Mitchell, D.G.: A new method for solving hard satisfiability problems. In: AAAI, vol. 92, pp. 440–446, July 1992
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423, 623–656 (1948)
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: International Workshop on Privacy Enhancing Technologies, pp. 54–68, Apr 2002. Springer Berlin Heidelberg
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: International Workshop on Privacy Enhancing Technologies, pp. 41–53, Apr 2002. Springer Berlin Heidelberg
Huang, D.: On measuring anonymity for wireless mobile ad-hoc networks. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks, pp. 779–786, Nov 2006. IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Baroutis, N., Younis, M. (2019). Location Privacy in Wireless Sensor Networks. In: Ammari, H. (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-91146-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-91146-5_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91145-8
Online ISBN: 978-3-319-91146-5
eBook Packages: EngineeringEngineering (R0)