By Topic

Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Gottumukkala, V.P.V. ; Sch. of Comput. Sci. & Inf., Univ. of Cincinnati, Cincinnati, OH, USA ; Pandit, V. ; Hailong Li ; Agrawal, D.P.

To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to preserve the location privacy of sensor nodes. In this paper, we propose a novel technique of protecting the location privacy of the base station in a WSN. Many techniques have been proposed to protect the source in WSNs and relatively fewer techniques exist to protect the base station. Our technique, which we call BLAST is aimed at protecting the base station from both Packet Tracing and Traffic Analysis attacks with equal importance to the delay and energy consumption. It also provides reasonable privacy against a Global attacker. The core idea is to vary the transmission range of a set of selected sensors around the base to confuse the attacker. Through this technique, we are able to create a set of fake base stations which cannot be identified even by a strong Global attacker who can hear all the transmissions.

Published in:

Communications (ICC), 2012 IEEE International Conference on

Date of Conference:

10-15 June 2012