Location privacy against traffic analysis attacks in wireless sensor networks

Xi Luo, Xu Ji, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)

Abstract

Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.

Original languageEnglish
Title of host publication2010 International Conference on Information Science and Applications, ICISA 2010
DOIs
Publication statusPublished - 2010 Jul 15
Event2010 International Conference in Information Science and Applications, ICISA 2010 - Seoul, Korea, Republic of
Duration: 2010 Apr 212010 Apr 23

Other

Other2010 International Conference in Information Science and Applications, ICISA 2010
CountryKorea, Republic of
CitySeoul
Period10/4/2110/4/23

Fingerprint

Wireless sensor networks
Communication
Sensor nodes
Telecommunication traffic
Authentication
Cryptography
Energy utilization
Denial-of-service attack

Keywords

  • Anonymous
  • Location privacy
  • Random routing
  • Traffic analysis attacks
  • WSN

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Luo, X., Ji, X., & Park, M. S. (2010). Location privacy against traffic analysis attacks in wireless sensor networks. In 2010 International Conference on Information Science and Applications, ICISA 2010 [5480564] https://doi.org/10.1109/ICISA.2010.5480564

Location privacy against traffic analysis attacks in wireless sensor networks. / Luo, Xi; Ji, Xu; Park, Myong Soon.

2010 International Conference on Information Science and Applications, ICISA 2010. 2010. 5480564.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Luo, X, Ji, X & Park, MS 2010, Location privacy against traffic analysis attacks in wireless sensor networks. in 2010 International Conference on Information Science and Applications, ICISA 2010., 5480564, 2010 International Conference in Information Science and Applications, ICISA 2010, Seoul, Korea, Republic of, 10/4/21. https://doi.org/10.1109/ICISA.2010.5480564
Luo X, Ji X, Park MS. Location privacy against traffic analysis attacks in wireless sensor networks. In 2010 International Conference on Information Science and Applications, ICISA 2010. 2010. 5480564 https://doi.org/10.1109/ICISA.2010.5480564
Luo, Xi ; Ji, Xu ; Park, Myong Soon. / Location privacy against traffic analysis attacks in wireless sensor networks. 2010 International Conference on Information Science and Applications, ICISA 2010. 2010.
@inproceedings{b3cd41f402a840dba8850e2589231561,
title = "Location privacy against traffic analysis attacks in wireless sensor networks",
abstract = "Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.",
keywords = "Anonymous, Location privacy, Random routing, Traffic analysis attacks, WSN",
author = "Xi Luo and Xu Ji and Park, {Myong Soon}",
year = "2010",
month = "7",
day = "15",
doi = "10.1109/ICISA.2010.5480564",
language = "English",
isbn = "9781424459438",
booktitle = "2010 International Conference on Information Science and Applications, ICISA 2010",

}

TY - GEN

T1 - Location privacy against traffic analysis attacks in wireless sensor networks

AU - Luo, Xi

AU - Ji, Xu

AU - Park, Myong Soon

PY - 2010/7/15

Y1 - 2010/7/15

N2 - Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.

AB - Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.

KW - Anonymous

KW - Location privacy

KW - Random routing

KW - Traffic analysis attacks

KW - WSN

UR - http://www.scopus.com/inward/record.url?scp=77954429311&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954429311&partnerID=8YFLogxK

U2 - 10.1109/ICISA.2010.5480564

DO - 10.1109/ICISA.2010.5480564

M3 - Conference contribution

AN - SCOPUS:77954429311

SN - 9781424459438

BT - 2010 International Conference on Information Science and Applications, ICISA 2010

ER -