Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks

Jing Deng*, Richard Han, Shivakant Mishra

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

99 Citations (Scopus)

Abstract

Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, the base station can be destroyed, rendering the entire sensor network inoperative, since a base station is a central point of data collection and hence failure. This paper investigates a suite of decorrelation countermeasures aimed at disguising the location of a base station against traffic analysis attacks. A set of basic countermeasures is described, including hop-by-hop reencryption of the packet to change its appearance, imposition of a uniform packet sending rate, and removal of correlation between a packet's receipt time and its forwarding time. More sophisticated countermeasures are described that introduce randomness into the path taken by a packet. Packets may also fork into multiple fake paths to further confuse an adversary. A technique is introduced to create multiple random areas of high communication activity called hot spots to deceive an adversary as to the true location of the base station. The effectiveness of these countermeasures against traffic analysis attacks is demonstrated analytically and via simulation using three evaluation criteria: total entropy of the network, total overhead/energy consumed, and the ability to frustrate heuristic-based search techniques to locate a base station.

Original languageEnglish
Pages (from-to)159-186
Number of pages28
JournalPervasive and Mobile Computing
Volume2
Issue number2
DOIs
Publication statusPublished - Apr 2006
Externally publishedYes

Keywords

  • Sensor network security
  • Traffic analysis

Fingerprint Dive into the research topics of 'Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks'. Together they form a unique fingerprint.

Cite this