Skip to main content

Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6843))

Abstract

In wireless sensor networks (WSNs), sinks or base stations are the key nodes of the networks which receive and process data from sensor nodes, hence their location should be protected well. However, they can easy fall prey to attacks launched by adversaries. In this paper, we propose a novel countermeasure Maelstrom to protect the location privacy of the key nodes in WSNs from both traffic analysis and packet tracing attacks. The basic idea of Maelstrom is to pre-assign several maelstrom areas in a network, which serve as the destinations of fake packets generated by sensor nodes. We also propose an Approximate Shortest Routing protocol (ASR) for packet delivery. Combining ASR with maelstroms congregated by fake packets, an adversary who launches both traffic analysis and packet tracing attack will be thwarted. The simulation results show that, compared with LPR combined with fake packet injection, under similar energy cost, Maelstrom can remarkably enhance the security of receiver-location in WSNs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  2. Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceeding of SecureComm 2005, Athens, Greece (September 2005)

    Google Scholar 

  3. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceeding of ICDCS 2005, Columbus, USA (June 2005)

    Google Scholar 

  4. Zhang, L.: A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. In: Proceeding of IWCMC 2006, New York, USA (July 2006)

    Google Scholar 

  5. Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. on Wireless Communications 7(10) (October 2008)

    Google Scholar 

  6. Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proceeding of WoWMoM 2006, Niagara, Canada (June 2006)

    Google Scholar 

  7. Mehta, K., Liu, D.: Location privacy in sensor networks against a global eavesdropper. In: Proceeding of ICNP 2007, Beijing, China (October 2007)

    Google Scholar 

  8. Fan, Y., Jiang, Y., Zhu, H., Chen, J., Shen, X.: Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. IEEE Trans. on Wireless Communications 10(3) (December 2010)

    Google Scholar 

  9. Zhu, Y., Bettati, R.: Compromising location privacy in wireless networks using sensors with limited information. In: Proceeding of ICDCS 2007, Toronto, Canada (June 2007)

    Google Scholar 

  10. Xi, Y., Schwiebert, L., Shim, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceeding of IPDPS 2006, Rhodes Island, Greece (April 2006)

    Google Scholar 

  11. Cheng, R., Yau, D.Y., Fu, J.: Packet cloaking: protecting receiver privacy against traffic analysis. In: Proceeding of NPSec 2007, Beijing, China (October 2007)

    Google Scholar 

  12. Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceeding of WSTFEUS 2004, Vienna, Austria (May 2004)

    Google Scholar 

  13. Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proceeding of SecureComm 2005, Athens, Greece (September 2005)

    Google Scholar 

  14. Ouyang, Y., Le, Z., Ford, J., Makedon, F.: PrivaSense: providing privacy protection for sensor networks. In: Proceeding of SenSys 2007, Sydney, Australia (November 2007)

    Google Scholar 

  15. Li, X., Wang, X., Zheng, N., Wan, Z., Gu, M.: Enhanced location pricacy protection of base station in wireless sensor networks. In: Proceeding of MSN 2009, Wu Yi Mountain, China (December 2009)

    Google Scholar 

  16. Chow, C., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. on Mobile Computing 10(1) (January 2011)

    Google Scholar 

  17. Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source Location Privacy: Analysis and Countermeasures. In: Proceeding of SecureComme 2009, Athens, Greece (September 2009)

    Google Scholar 

  18. Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., LaPorta, T.: Cross-layer enhanced source location privacy in sensor networks. In: Proceeding of SECON 2009, Rome, Italy (June 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K. (2011). Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2011. Lecture Notes in Computer Science, vol 6843. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23490-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23490-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23489-7

  • Online ISBN: 978-3-642-23490-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics