Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Title | Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Haakensen, T., Thulasiraman, P. |
Conference Name | 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) |
ISBN Number | 978-1-5386-1104-3 |
Keywords | 6LoWPAN, Ad hoc networks, composability, cyber physical systems security, enhancing sink node anonymity, IEEE 802.15 Standard, IEEE 802.15.4, k-anonymity, Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol, military communication, modified LOADng protocol, privacy, pubcrawl, reactive routing protocol, remote sensing, resilience, Resiliency, Routing, Routing protocols, security, Sensor networks, sensor nodes, sink-node vulnerability, specific routing protocol, tactical sensor networks, tactical wireless sensor networks, tactical WSN, telecommunication security, Wireless sensor networks, WSN communication protocols |
Abstract | Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method. |
URL | http://ieeexplore.ieee.org/document/8249005/ |
DOI | 10.1109/UEMCON.2017.8249005 |
Citation Key | haakensen_enhancing_2017 |
- resilience
- WSN communication protocols
- wireless sensor networks
- telecommunication security
- tactical WSN
- tactical wireless sensor networks
- tactical sensor networks
- specific routing protocol
- sink-node vulnerability
- sensor nodes
- sensor networks
- security
- Routing protocols
- Routing
- Resiliency
- 6LoWPAN
- remote sensing
- reactive routing protocol
- pubcrawl
- privacy
- modified LOADng protocol
- military communication
- Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
- k-anonymity
- IEEE 802.15.4
- IEEE 802.15 Standard
- enhancing sink node anonymity
- Cyber Physical Systems Security
- composability
- Ad hoc networks