Traffic De-Correlation Techniques for Countering A World Eavesdropper in Wireless Sensor Networks

Authors

  • Yenumal Sankara Rao  Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
  • Vinjamuri Gayathri   Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Keywords:

Wireless Sensor Networks (WSN), listening stealthily, logical data, security, obscurity, diagram hypothesis.

Abstract

We address the issue of keeping the induction of relevant data in occasion driven remote sensor systems (WSNs). The issue is considered under a worldwide busybody who investigates low-level RF transmission qualities, for example, the number of transmitted parcels, between bundle times, and movement directionality, to deduce occasion area, its event time, and the sink area. We devise a general activity examination technique for deducing relevant data by connecting transmission times with listening in areas. Our investigation demonstrates that most existing countermeasures either neglect to give satisfactory insurance, or bring about high correspondence and defer overheads. To moderate the effect of spying, we propose asset productive movement standardization plans. In contrast with the cutting edge, our strategies diminish the correspondence overhead by over half, and the end-to end delay by over 30%. To do as such, we segment the WSN to least associated ruling sets that work in a round-robin mold. This enables us to lessen the quantity of movement sources dynamic at a given time, while giving steering ways to any hub in the WSN. We additionally diminish bundle delay by freely planning parcel transferring, without uncovering the movement directionality.

References

  1. M. Akhlaq and T. R. Sheltami. RTSP: An accurate and energy-efficient protocol for clock synchronization in wsns. IEEE Trans-actions on Instrumentation and Measurement, 62(3):578–589, 2013.
  2. B. Alomair, A. Clark, J. Cuellar, and R. Poovendran. Toward a statistical framework for source anonymity in sensor networks. IEEE Transactions on Mobile Computing, 12(2):248–260, 2013.
  3. F. Armknecht, J. Girao, A. Matos, and R. Aguiar. Who said that? privacy at the link layer. In Proc. of the INFOCOM Conference, pages 2521–2525, 2007.
  4. K. Bicakci, H. Gultekin, B. Tavli, and I. Bagci. Maximizing life-time of event-unobservable wireless sensor networks. Computer Standards & Interfaces, 33(4):401–410, 2011.
  5. G. Chinnu and N. Dhinakaran. Protecting location privacy in wireless sensor networks against a local eavesdropper–a survey. International Journal of Computer Applications, 56(5):25–47, 2012.
  6. M. Conti, J. Willemsen, and B. Crispo. Providing source location privacy in wireless sensor networks: A survey. Communications Surveys Tutorials, 15(3):1238–1280, 2013.
  7. J. Deng, R. Han, and S. Mishra. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, 2(2):159–186, 2006.
  8. M. Fruth. Probabilistic model checking of contention resolution in the IEEE 802.15.4 low-rate wireless personal area network protocol. In Proc. of the Symp. on Leveraging Applications of Formal Methods, Verification and Validation, pages 290–297, 2006.
  9. M. Garey and D. Johnson. Computers and Intractability, volume 174. Freeman, 1979.
  1. B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proc. of the ACM Conference on Mobile Systems, Spplications, and Services, pages 40–53, 2008.
  2. J. Gross and J. Yellen. Handbook of Graph Theory. CRC, 2004.
  3. A. Jhumka, M. Leeke, and S. Shrestha. On the use of fake sources for source location privacy: Trade-offs between energy and privacy. The Computer Journal, 54(6):860–874, 2011.
  4. L. Jia, R. Rajaraman, and T. Suel. An efficient distributed algorithm for constructing small dominating sets. Distributed Computing, 15(4):193–205, 2002.
  5. Y. Li and J. Ren. Source-location privacy through dynamic routing in wireless sensor networks. In Proc. of the INFOCOM Conference, pages 1–9, 2010.
  6. L. Lightfoot, Y. Li, and J. Ren. Preserving source-location privacy in wireless sensor network using STaR routing. In Proc. of the IEEE GLOBECOM conference, pages 1–5, 2010.
  7. X. Luo, X. Ji, and M. Park. Location privacy against traffic analysis attacks in wireless sensor networks. In Proc. of the IEEE Conference on Information Science and Applications, pages 1–6, 2010.
  8. M. Mahmoud and X. Shen. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(10):1805–1818, 2012.
  9. M. Mahmoud and X. Shen. A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks. In Proc. of the IEEE ICC Conference, pages 939–943, 2012.
  10. M. Mahmoud and X. Shen. Secure and efficient source location privacy-preserving scheme for wireless sensor networks. In Proc. of the IEEE ICC Conference, pages 1123–1127, 2012.
  11. K. Mehta, D. Liu, and M. Wright. Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing, 11(2):320–336, 2012.
  12. D. N. Ngo. Deployment of 802.15.4 sensor networks for C4ISR operations. Technical report, DTIC Document, 2006.

 

  1. C. Ozturk, Y. Zhang, and W. Trappe. Source-location privacy in energy-constrained sensor network routing. In Proc. of the ACM SASN Workshop, pages 88–93, 2004.
  2. M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In Proc. of the INFOCOM Conference, pages 51–55, 2008.
  3. K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie. Protocols for self-organization of a wireless sensor network. IEEE Personal Communications, 7(5):16–27, 2000.
  4. J. A. Stankovic, A. D. Wood, and T. He. Realistic applications for wireless sensor networks. In Theoretical Aspects of Distributed Computing in Sensor Networks, pages 835–863. 2011.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Yenumal Sankara Rao, Vinjamuri Gayathri , " Traffic De-Correlation Techniques for Countering A World Eavesdropper in Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.241-249, July-August-2017.