Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Providing location anonymity in a multi-base station wireless sensor network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
El-Badry, R. ; Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland Baltimore County, Baltimore, MD, USA ; Younis, M.

Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve mission-critical and security-sensitive applications that involve hostile adversaries. These adversaries are eager to disrupt the WSN operation. Given the important role that the base-station (BS) plays in a WSN, the adversary opts to identify the BS and determine its location in order to damage the BS or launch a targeted denial of service attack. Therefore, maintaining the BS anonymity is of utmost importance in WSNs. Even if the adversary cannot decode packets, correlating the intercepted transmission through traffic analysis can reveal the position of the BS. This paper considers setups in which the network has multiple base-stations and proposes a novel approach in which these base-stations collaborate on confusing the adversary and averting attacks. The proposed Multi-player Anonymity optimization Game theoretic (MAG) approach calls for the introduction of inter-BS deceptive traffic and use game theory to determine the volume and destination of such traffic so that the variance in the location anonymity over all BSs is reduced. The simulation results demonstrate the effectiveness of MAG.

Published in:

Communications (ICC), 2012 IEEE International Conference on

Date of Conference:

10-15 June 2012