Visible to the public Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks

TitleEncircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsRimjhim, Roy, Pradeep Kumar, Prakash Singh, Jyoti
Conference Name2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS)
Keywordsbase station, Base stations, compositionality, cryptographic protocols, cryptography, data privacy, delay, dummy packets, dummy traffic, encryption techniques, Human Behavior, incoming packet, Location Privacy breach, Location Privacy in Wireless Networks, Metrics, packet delivery, Phantoms, privacy, privacy breaches, pubcrawl, Resiliency, Routing, routing information, routing schemes, Sensors, signal strength, source location privacy, telecommunication network routing, telecommunication security, telecommunication traffic, TTL, Wireless sensor networks
AbstractLocation Privacy breach in Wireless Sensor Networks (WSNs) cannot be controlled by encryption techniques as all the communications are signal based. Signal strength can be analyzed to reveal many routing information. Adversary takes advantage of this and tracks the incoming packet to know the direction of the packet. With the information of location of origin of packets, the Source is also exposed which is generating packets on sensing any object. Thus, the location of subject is exposed. For protecting such privacy breaches, routing schemes are used which create anonymization or diverts the adversary. In this paper, we are using `Dummy' packets that will be inserted into real traffic to confuse the adversary. The dummy packets are such inserted that they encircle the Sink or Base Station. These Dummy packets are send with a value of TTL (Time To Live) field such that they travel only a few hops. Since adversary starts backtracking from the Sink, it will be trapped in the dummy traffic. In our protocol, we are confusing adversary without introducing any delay in packet delivery. Adversary uses two common methods for knowing the source i.e. Traffic Analysis and Back-tracing. Mathematically and experimentally, our proposal is sound for both type of methods. Overhead is also balanced as packets will not live long.
DOI10.1109/CSITSS.2018.8768759
Citation Keyrimjhim_encircling_2018